scenario: I have 2 internet connections connected to SW,
Fiber(X1) - Fiber provider A
Coax(X2) - Coax copper cable provider B
Fiber is having issues reaching Google/Gmail/etc
I will route anything bound to Google via 2nd Coax connection
check whats the interface for Coax (X2)
create Address objects for google (nslookup mail.google.com, nslookup calendar.google.com, nslookup www.google.com) - create a Address Group w these address objects
New Address Object (IPV4)
WAN, Network, 142.251.167.0/255.255.255.0 etc etc
create new Address Group "Google IPs Group"
create a new Route rule
Name: Google via Coax
Source: Any
Destination: "Google IPs Group"
Service: Any (standard route)
Interface: X2
Gateway: X2 Default Gateway
Metric: 1
Comment: Temporary google via Coax
disable route when interface is connected
Create NAT rules to translate source and dest IPs
1. NAT Policies > Add
Name: "From Google"
Original Source: "Google IP Group"
Translated Src: Original
Original Dest: Any
Translated Dest: Original
Original Svc: Any
Translated Svc: Origin
Inbound Interface: X2
Outbound Interface: X2
IPV4 only
enable NAT policy
2. NAT Policies > Add
Name: "To Google"
Original Src: Any
Translated Src: Original
Original Dest: "Google IP Group"
Translated Dest: Original
Original Svc: Any
Translated Svc: Original
Inbound Interface: X2
Outbound Interface: X2
Comment: To Google, IPV4 only, enable NAT policy
packets outbound to Google services will flow over Coax connection (X2) and be masqueraded by Sonicwall
route all SSH connections to 2.2.2.2(unreachable by sonicwall) via 1.1.1.1 (reachable)
create Network > address objects, create 2.2.2.2 and 1.1.1.1 addr objects
click on Network > routing > add route