SonicWALL manual SonicWALL SSL VPN 4000 Getting Started Guide

Page 58

7.Enter the fully qualified domain name (FQDN) of the hostname you registered with dyndns.org. Make sure you provide the same hostname and domain as you configured.

8.You may optionally select Enable Wildcard and/or configure an MX entry in the Mail Exchanger field.

9.Click the Advanced tab. You can typically leave the default settings on this page.

10.The On-line Settings section provides control over what address is registered with the dynamic DNS provider. The options are:

Let the server detect IP Address - The dynamic DNS provider determines the IP address based upon the source address of the connection. This is the most common setting.

Automatically set IP Address to the Primary WAN Interface IP Address - This will cause the SonicWALL device to assert its WAN IP address as the registered IP address, overriding auto-detection by the dynamic DNS server. Useful if detection is not working correctly.

Specify IP Address manually - Allows for the IP address to be registered to be manually specified and asserted.

11.The Off-line Settings section controls what IP Address is registered with the dynamic DNS service provider if the dynamic DNS entry is taken off-line locally (disabled) on the SonicWALL. The options are:

Do nothing - the default setting. This allows the previously registered address to remain current with the dynamic DNS provider.

Use the Off-Line IP Address previously configured at Provider’s site - If your provider supports manual configuration of Off-Line Settings, you can select this option to use those settings when this profile is taken administratively offline.

12. Click the OK button.

SonicWALL SSL VPN 4000 Getting Started Guide

Page 57

Image 58
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Configuration Steps SonicWALL Sslvpn 4000 Appliance Getting Started GuideBefore You Begin Check Package Contents Any Items Missing?What You Need to Begin Network Configuration Information Other InformationScenario B Selecting a SonicWALL Recommended  Deployment ScenarioScenario a SSL VPN on a New DMZ Scenario C SSL VPN on the LAN2 Applying Power to the SonicWALL Sslvpn Power LED Test LED Alarm LED Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Select the Users Local Users Setting Your Administrator PasswordAdding a Local User Select Users Local UsersConfiguring SSL VPN Network Settings Setting Time ZoneConfiguring DNS / Wins Configuring the X0 IP address for Scenario B and Scenario C Select the Network InterfacesPage Select the Network Routes Configuring a Default RouteAdding a NetExtender Client Route Select the NetExtender Client RoutesScenario a Setting your NetExtender Address RangeRoute Destination Network Subnet Mask 192.168.200.100 toSelect the NetExtender Client Settings Scenario CPage  Connecting the SonicWALL Sslvpn Scenario a Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario B Connecting the SonicWALL Sslvpn Scenario C Configuring Your Network InterfaceScenario C Connecting the SonicWALL Sslvpn Scenario a Connecting to the SonicWALL UTM Appliance  Configuring Your Gateway DeviceScenario a SSL VPN on a New DMZ Select the Firewall Access Rules Select the Network SettingsScenario a Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B SSL VPN on Existing DMZ Scenario B Connecting to the SonicWALL UTM ApplianceScenario B Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C Configuring SSL VPN LAN Connectivity Scenario C Connecting to the SonicWALL UTM ApplianceScenario C SSL VPN on the LAN Scenario C Setting Public Server Access in SonicOS Standard Select Public Server RuleScenario C Setting Public Server Access in SonicOS Enhanced Enter SSL VPN in the Server Name field Testing Your SSL VPN Connection Verifying a User Connection from the InternetContinue to Step Registering with MySonicWALL  Registering Your SonicWALL SslvpnBefore You Register Creating a MySonicWALL Account from System LicensesSonicWALL SSL VPN 4000 Getting Started Guide Congratulations Click ContinueConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Windows XP Configuring a Static IP AddressWindows Open Network Windows NTSelect Specify an IP Address  Mounting Guidelines Glossary of Networking Terms Page Lithium Battery Warning Cable ConnectionsCopyright Notice TrademarksSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc