SonicWALL 4000 manual Configuring a Static IP Address, Windows XP

Page 59

Configuring a Static IP Address

If you did not enable the SonicWALL UTM appliance DHCP server, you must configure each computer with a static IP address from your LAN or WLAN IP address range. After the SonicWALL SSL VPN 4000 has restarted, follow the steps below for configuring your network clients running any of the following Microsoft Windows operating systems on your LAN/WLAN:

Windows XP

1.Open the Local Area Connection Properties window.

2.Double-clickInternet Protocol (TCP/IP) to open the Internet Protocol (TCP/IP) Properties window.

3.Select Use the following IP address and type an IP address from your LAN IP range in the IP address field.

4.Type the appropriate subnet mask (for example, 255.255.255.0) in the Subnet Mask field.

5.Type the SonicWALL SSL VPN 4000 LAN IP Address into the Default Gateway field.

6.Type the DNS IP address in the Preferred DNS Server field. If you have more than one address, type the second one in the Alternate DNS server field.

7.Click OK for the settings to take effect.

Windows 2000

1.From your Windows Start menu, select Settings.

2.Open Network and Dial-up Connections.

3.Click Properties.

4.Highlight Internet Protocol (TCP/IP) and click Properties.

5.Select Use the following IP address.

6.Type an IP address from your LAN IP range IP address field.

7.Type the appropriate subnet mask (for example, 255.255.255.0) in the Subnet Mask field.

8.Type the SonicWALL SSL VPN 4000 LAN IP Address into the Default Gateway field.

9.If you have a DNS Server IP address from your ISP, enter it in the Preferred DNS Server field.

10.Click OK for the settings to take effect.

Page 58

Image 59
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Appliance Getting Started Guide SonicWALL Sslvpn 4000 Configuration StepsWhat You Need to Begin Check Package Contents Any Items Missing?Before You Begin Other Information Network Configuration InformationScenario C SSL VPN on the LAN Selecting a SonicWALL Recommended  Deployment ScenarioScenario a SSL VPN on a New DMZ Scenario BPower LED Test LED Alarm LED 2 Applying Power to the SonicWALL Sslvpn Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Select Users Local Users Setting Your Administrator PasswordAdding a Local User Select the Users Local UsersConfiguring DNS / Wins Setting Time ZoneConfiguring SSL VPN Network Settings Select the Network Interfaces Configuring the X0 IP address for Scenario B and Scenario CPage Select the NetExtender Client Routes Configuring a Default RouteAdding a NetExtender Client Route Select the Network Routes192.168.200.100 to Setting your NetExtender Address RangeRoute Destination Network Subnet Mask Scenario aScenario C Select the NetExtender Client SettingsPage Scenario a Connecting the SonicWALL Sslvpn  Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario C Configuring Your Network Interface Scenario B Connecting the SonicWALL SslvpnScenario C Connecting the SonicWALL Sslvpn Scenario a SSL VPN on a New DMZ  Configuring Your Gateway DeviceScenario a Connecting to the SonicWALL UTM Appliance Scenario a Allowing WAN DMZ Connection in SonicOS Standard Select the Network SettingsSelect the Firewall Access Rules Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B Allowing WAN DMZ Connection in SonicOS Standard Scenario B Connecting to the SonicWALL UTM ApplianceScenario B SSL VPN on Existing DMZ Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C SSL VPN on the LAN Scenario C Connecting to the SonicWALL UTM ApplianceScenario C Configuring SSL VPN LAN Connectivity Select Public Server Rule Scenario C Setting Public Server Access in SonicOS StandardEnter SSL VPN in the Server Name field Scenario C Setting Public Server Access in SonicOS EnhancedVerifying a User Connection from the Internet  Testing Your SSL VPN ConnectionContinue to Step Creating a MySonicWALL Account from System Licenses  Registering Your SonicWALL SslvpnBefore You Register Registering with MySonicWALLSonicWALL SSL VPN 4000 Getting Started Guide Click Continue CongratulationsConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Windows Configuring a Static IP AddressWindows XP Select Specify an IP Address Windows NTOpen Network  Mounting Guidelines Glossary of Networking Terms Page Cable Connections Lithium Battery WarningTrademarks Copyright NoticeSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc