SonicWALL 4000 manual Scenario B SSL VPN on Existing DMZ

Page 36

Scenario B: SSL VPN on Existing DMZ

This section provides procedures to configure your gateway appliance based on Scenario B. This section contains the following subsections:

“Scenario B: Connecting to the SonicWALL UTM Appliance” on page 35

“Scenario B: Allowing WAN -> DMZ Connection in SonicOS Standard” on page 35

“Scenario B: Allowing DMZ -> LAN Connection in SonicOS Standard” on page 37

“Scenario B: Allowing WAN -> DMZ Connection in SonicOS Enhanced” on page 41

“Scenario B: Allowing DMZ -> LAN Connection in SonicOS Enhanced” on page 44

Scenario B: Connecting to the SonicWALL UTM Appliance

1.Using a computer connected to your LAN, launch your Web browser and enter the IP address of your existing SonicWALL UTM appliance in the Location or Address field.

2.When the management interface displays, enter your user name and password in the appropriate fields and press the Login button.

Note: Remember that you are logging into your SonicWALL UTM appliance, not the SSL VPN. Your user name and password combination may be different from the user name and password you recorded for your SSL VPN 4000.

Scenario B: Allowing WAN -> DMZ Connection in SonicOS Standard

Follow this procedure if you are connecting the SonicWALL SSL VPN 4000 to a SonicWALL UTM appliance running SonicOS Standard. If your SonicWALL UTM appliance is running SonicOS Enhanced, skip to “Scenario A: Allowing WAN -> SSL VPN Connection in SonicOS Enhanced” on page 29.

Note: If you are allowing HTTP access to your SonicWALL SSL VPN appliance as well as HTTPS access, you need to run the wizard twice to create public server access rules for both HTTP and HTTPS.

Create a public server access rule for HTTPS traffic:

1.Select the Firewall > Access Rules page.

2.Click .

3.In the Welcome to the SonicWALL Network Access Rules Wizard page, click Next.

SonicWALL SSL VPN 4000 Getting Started Guide

Page 35

Image 36
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Configuration Steps SonicWALL Sslvpn 4000 Appliance Getting Started GuideCheck Package Contents Any Items Missing? Before You BeginWhat You Need to Begin Network Configuration Information Other InformationSelecting a SonicWALL Recommended  Deployment Scenario Scenario a SSL VPN on a New DMZScenario B Scenario C SSL VPN on the LAN2 Applying Power to the SonicWALL Sslvpn Power LED Test LED Alarm LED Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Setting Your Administrator Password Adding a Local UserSelect the Users Local Users Select Users Local UsersSetting Time Zone Configuring SSL VPN Network SettingsConfiguring DNS / Wins Configuring the X0 IP address for Scenario B and Scenario C Select the Network InterfacesPage Configuring a Default Route Adding a NetExtender Client RouteSelect the Network Routes Select the NetExtender Client RoutesSetting your NetExtender Address Range Route Destination Network Subnet MaskScenario a 192.168.200.100 toSelect the NetExtender Client Settings Scenario CPage  Connecting the SonicWALL Sslvpn Scenario a Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario B Connecting the SonicWALL Sslvpn Scenario C Configuring Your Network InterfaceScenario C Connecting the SonicWALL Sslvpn  Configuring Your Gateway Device Scenario a Connecting to the SonicWALL UTM ApplianceScenario a SSL VPN on a New DMZ Select the Network Settings Select the Firewall Access RulesScenario a Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B Connecting to the SonicWALL UTM Appliance Scenario B SSL VPN on Existing DMZScenario B Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C Connecting to the SonicWALL UTM Appliance Scenario C Configuring SSL VPN LAN ConnectivityScenario C SSL VPN on the LAN Scenario C Setting Public Server Access in SonicOS Standard Select Public Server RuleScenario C Setting Public Server Access in SonicOS Enhanced Enter SSL VPN in the Server Name field Testing Your SSL VPN Connection Verifying a User Connection from the InternetContinue to Step  Registering Your SonicWALL Sslvpn Before You RegisterRegistering with MySonicWALL Creating a MySonicWALL Account from System LicensesSonicWALL SSL VPN 4000 Getting Started Guide Congratulations Click ContinueConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Configuring a Static IP Address Windows XPWindows Windows NT Open NetworkSelect Specify an IP Address  Mounting Guidelines Glossary of Networking Terms Page Lithium Battery Warning Cable ConnectionsCopyright Notice TrademarksSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc