SonicWALL 4000 manual Scenario C, Select the NetExtender Client Settings

Page 16

Scenario C

Select a range that falls within your existing LAN subnet. For example, if your LAN uses the 192.168.168.0/24 subnet, and you want to support up to 10 concurrent NetExtender sessions, you could use 192.168.168.240 to 192.168.168.249, providing they are not already in use.

To set your NetExtender address range, perform the following steps:

1.Select the NetExtender > Client Settings page.

2.Enter an address range for your clients in the Client Address Range Begin and Client Address Range End fields.

Scenario A

192.168.200.100 to

 

192.168.200.200

 

(default range)

 

 

Scenario B

An unused range within

 

your DMZ subnet.

Scenario C

An unused range within your LAN subnet.

Note: If you have too few available addresses to support your desired number of concurrent NetExtender users you may use a new subnet for NetExtender. This condition might occur if your existing DMZ or LAN is configured in NAT mode with a small subnet space, such as 255.255.255.224, or more commonly if your DMZ or LAN is configured in Transparent mode and you have a limited number of public addresses from your ISP.

In either case, you may assign a new, unallocated IP range to NetExtender (such as 192.168.10.100 to 192.168.10.200) and configure a route to this range on your gateway appliance.

SonicWALL SSL VPN 4000 Getting Started Guide

Page 15

Image 16
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Configuration Steps SonicWALL Sslvpn 4000 Appliance Getting Started GuideBefore You Begin Check Package Contents Any Items Missing?What You Need to Begin Network Configuration Information Other InformationSelecting a SonicWALL Recommended  Deployment Scenario Scenario a SSL VPN on a New DMZScenario B Scenario C SSL VPN on the LAN2 Applying Power to the SonicWALL Sslvpn Power LED Test LED Alarm LED Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Setting Your Administrator Password Adding a Local UserSelect the Users Local Users Select Users Local UsersConfiguring SSL VPN Network Settings Setting Time ZoneConfiguring DNS / Wins Configuring the X0 IP address for Scenario B and Scenario C Select the Network InterfacesPage Configuring a Default Route Adding a NetExtender Client RouteSelect the Network Routes Select the NetExtender Client RoutesSetting your NetExtender Address Range Route Destination Network Subnet MaskScenario a 192.168.200.100 toSelect the NetExtender Client Settings Scenario CPage  Connecting the SonicWALL Sslvpn Scenario a Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario B Connecting the SonicWALL Sslvpn Scenario C Configuring Your Network InterfaceScenario C Connecting the SonicWALL Sslvpn Scenario a Connecting to the SonicWALL UTM Appliance  Configuring Your Gateway DeviceScenario a SSL VPN on a New DMZ Select the Firewall Access Rules Select the Network SettingsScenario a Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B SSL VPN on Existing DMZ Scenario B Connecting to the SonicWALL UTM ApplianceScenario B Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C Configuring SSL VPN LAN Connectivity Scenario C Connecting to the SonicWALL UTM ApplianceScenario C SSL VPN on the LAN Scenario C Setting Public Server Access in SonicOS Standard Select Public Server RuleScenario C Setting Public Server Access in SonicOS Enhanced Enter SSL VPN in the Server Name field Testing Your SSL VPN Connection Verifying a User Connection from the InternetContinue to Step  Registering Your SonicWALL Sslvpn Before You RegisterRegistering with MySonicWALL Creating a MySonicWALL Account from System LicensesSonicWALL SSL VPN 4000 Getting Started Guide Congratulations Click ContinueConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Windows XP Configuring a Static IP AddressWindows Open Network Windows NTSelect Specify an IP Address  Mounting Guidelines Glossary of Networking Terms Page Lithium Battery Warning Cable ConnectionsCopyright Notice TrademarksSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc