SonicWALL 4000 Setting your NetExtender Address Range, Route Destination Network Subnet Mask

Page 15

Route 1

Destination Network: 0.0.0.0

 

Subnet Mask: 128.0.0.0

 

 

Route 2

Destination Network: 128.0.0.0

 

Subnet Mask: 128.0.0.0

 

 

4. Enter your subnet mask in the Subnet Mask field.

5.Click the Add button to add this client route.

Setting your NetExtender Address Range

The NetExtender IP range defines the IP address pool from which addresses will be assigned to remote users during NetExtender sessions. The range needs to be large enough to accommodate the maximum number of concurrent NetExtender users you wish to support.

The range should fall within the same subnet as the interface to which the SonicWALL SSL VPN appliance is connected, and in cases where there are other hosts on the same segment as the SonicWALL SSL VPN appliance, it must not overlap or collide with any assigned addresses. You can determine the correct subnet based on your network scenario selection:

Scenario A

Use the default NetExtender range:

 

192.168.200.100 to 192.168.200.200

 

 

Scenario B

Select a range that falls within your existing DMZ subnet. For

 

example, if your DMZ uses the 192.168.50.0/24 subnet, and

 

you want to support up to 30 concurrent NetExtender sessions,

 

you could use 192.168.50.220 to 192.168.50.249, providing

 

they are not already in use.

 

 

Page 14

Image 15
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Appliance Getting Started Guide SonicWALL Sslvpn 4000 Configuration StepsCheck Package Contents Any Items Missing? Before You BeginWhat You Need to Begin Other Information Network Configuration InformationScenario C SSL VPN on the LAN Selecting a SonicWALL Recommended  Deployment ScenarioScenario a SSL VPN on a New DMZ Scenario BPower LED Test LED Alarm LED 2 Applying Power to the SonicWALL Sslvpn Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Select Users Local Users Setting Your Administrator PasswordAdding a Local User Select the Users Local UsersSetting Time Zone Configuring SSL VPN Network SettingsConfiguring DNS / Wins Select the Network Interfaces Configuring the X0 IP address for Scenario B and Scenario CPage Select the NetExtender Client Routes Configuring a Default RouteAdding a NetExtender Client Route Select the Network Routes192.168.200.100 to Setting your NetExtender Address RangeRoute Destination Network Subnet Mask Scenario aScenario C Select the NetExtender Client SettingsPage Scenario a Connecting the SonicWALL Sslvpn  Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario C Configuring Your Network Interface Scenario B Connecting the SonicWALL SslvpnScenario C Connecting the SonicWALL Sslvpn  Configuring Your Gateway Device Scenario a Connecting to the SonicWALL UTM ApplianceScenario a SSL VPN on a New DMZ Select the Network Settings Select the Firewall Access RulesScenario a Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B Connecting to the SonicWALL UTM Appliance Scenario B SSL VPN on Existing DMZScenario B Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C Connecting to the SonicWALL UTM Appliance Scenario C Configuring SSL VPN LAN ConnectivityScenario C SSL VPN on the LAN Select Public Server Rule Scenario C Setting Public Server Access in SonicOS StandardEnter SSL VPN in the Server Name field Scenario C Setting Public Server Access in SonicOS EnhancedVerifying a User Connection from the Internet  Testing Your SSL VPN ConnectionContinue to Step Creating a MySonicWALL Account from System Licenses  Registering Your SonicWALL SslvpnBefore You Register Registering with MySonicWALLSonicWALL SSL VPN 4000 Getting Started Guide Click Continue CongratulationsConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Configuring a Static IP Address Windows XPWindows Windows NT Open NetworkSelect Specify an IP Address  Mounting Guidelines Glossary of Networking Terms Page Cable Connections Lithium Battery WarningTrademarks Copyright NoticeSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc