SonicWALL 4000 manual  Configuring Your Gateway Device, Scenario a SSL VPN on a New DMZ

Page 22

Configuring Your Gateway Device

Now that you have set up your SonicWALL SSL VPN 4000, you need to configure your gateway device to work with the SonicWALL SSL VPN 4000. Refer to the table in “Selecting a SonicWALL Recommended Deployment Scenario” on page 4 to determine the proper scenario for your network configuration.

This section contains the following subsections:

“Scenario A: SSL VPN on a New DMZ” on page 21

“Scenario B: SSL VPN on Existing DMZ” on page 35

“Scenario C: SSL VPN on the LAN” on page 47

Scenario A: SSL VPN on a New DMZ

This section provides procedures to configure your gateway appliance based on Scenario A. This section contains the following subsections:

“Scenario A: Connecting to the SonicWALL UTM Appliance” on page 21

“Scenario A: Configuring a DMZ or OPT Port in SonicOS Standard” on page 22

“Scenario A: Allowing WAN -> DMZ Connection in SonicOS Standard” on page 22

“Scenario A: Allowing DMZ -> LAN Connection in SonicOS Standard” on page 24

“Scenario A: Adding a New SSL VPN Custom Zone in SonicOS Enhanced” on page 28

“Scenario A: Allowing WAN -> SSL VPN Connection in SonicOS Enhanced” on page 29

“Scenario A: Allowing SSL VPN -> LAN Connection in SonicOS Enhanced” on page 32

Scenario A: Connecting to the SonicWALL UTM Appliance

1.Using a computer connected to your LAN, launch your Web browser and enter the IP address of your existing SonicWALL UTM appliance in the Location or Address field.

2.When the management interface displays, enter your user name and password in the appropriate fields and press the Login button.

Note: Remember that you are logging into your SonicWALL UTM appliance, not the SonicWALL SSL VPN 4000. Your user name and password combination may be different from the user name and password you recorded for your

SonicWALL SSL VPN 4000.

SonicWALL SSL VPN 4000 Getting Started Guide

Page 21

Image 22
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Configuration Steps SonicWALL Sslvpn 4000 Appliance Getting Started GuideBefore You Begin Check Package Contents Any Items Missing?What You Need to Begin Network Configuration Information Other InformationScenario B Selecting a SonicWALL Recommended  Deployment ScenarioScenario a SSL VPN on a New DMZ Scenario C SSL VPN on the LAN2 Applying Power to the SonicWALL Sslvpn Power LED Test LED Alarm LED Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Select the Users Local Users Setting Your Administrator PasswordAdding a Local User Select Users Local UsersConfiguring SSL VPN Network Settings Setting Time ZoneConfiguring DNS / Wins Configuring the X0 IP address for Scenario B and Scenario C Select the Network InterfacesPage Select the Network Routes Configuring a Default RouteAdding a NetExtender Client Route Select the NetExtender Client RoutesScenario a Setting your NetExtender Address RangeRoute Destination Network Subnet Mask 192.168.200.100 toSelect the NetExtender Client Settings Scenario CPage  Connecting the SonicWALL Sslvpn Scenario a Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario B Connecting the SonicWALL Sslvpn Scenario C Configuring Your Network InterfaceScenario C Connecting the SonicWALL Sslvpn Scenario a Connecting to the SonicWALL UTM Appliance  Configuring Your Gateway DeviceScenario a SSL VPN on a New DMZ Select the Firewall Access Rules Select the Network SettingsScenario a Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B SSL VPN on Existing DMZ Scenario B Connecting to the SonicWALL UTM ApplianceScenario B Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C Configuring SSL VPN LAN Connectivity Scenario C Connecting to the SonicWALL UTM ApplianceScenario C SSL VPN on the LAN Scenario C Setting Public Server Access in SonicOS Standard Select Public Server RuleScenario C Setting Public Server Access in SonicOS Enhanced Enter SSL VPN in the Server Name field Testing Your SSL VPN Connection Verifying a User Connection from the InternetContinue to Step Registering with MySonicWALL  Registering Your SonicWALL SslvpnBefore You Register Creating a MySonicWALL Account from System LicensesSonicWALL SSL VPN 4000 Getting Started Guide Congratulations Click ContinueConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Windows XP Configuring a Static IP AddressWindows Open Network Windows NTSelect Specify an IP Address  Mounting Guidelines Glossary of Networking Terms Page Lithium Battery Warning Cable ConnectionsCopyright Notice TrademarksSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc