SonicWALL 4000 manual Copyright Notice, Trademarks

Page 65

Copyright Notice

© 2008 SonicWALL, Inc. All rights reserved.

Under the copyright laws, this manual or the software described within, can not be copied, in whole or part, without the written consent of the manufacturer, except in the normal use of the software to make a backup copy. The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) can be sold, given, or loaned to another person. Under the law, copying includes translating into another language or format.

Specifications and descriptions subject to change without notice.

Trademarks

SonicWALL is a registered trademark of SonicWALL, Inc.

Microsoft Windows 98, Windows NT, Windows 2000, Windows XP, Windows Server 2003, Internet Explorer, and Active Directory are trademarks or registered trademarks of Microsoft Corporation.

Netscape is a registered trademark of Netscape Communications Corporation in the U.S. and other countries. Netscape Navigator and Netscape Communicator are also trademarks of Netscape Communications Corporation and may be registered outside the U.S.

Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries.

Firefox is a trademark of the Mozilla Foundation.

Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies and are the sole property of their respective manufacturers.

Page 64

Image 65
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Appliance Getting Started Guide SonicWALL Sslvpn 4000 Configuration StepsWhat You Need to Begin Check Package Contents Any Items Missing?Before You Begin Other Information Network Configuration InformationScenario a SSL VPN on a New DMZ Selecting a SonicWALL Recommended  Deployment ScenarioScenario B Scenario C SSL VPN on the LANPower LED Test LED Alarm LED 2 Applying Power to the SonicWALL Sslvpn Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Adding a Local User Setting Your Administrator PasswordSelect the Users Local Users Select Users Local UsersConfiguring DNS / Wins Setting Time ZoneConfiguring SSL VPN Network Settings Select the Network Interfaces Configuring the X0 IP address for Scenario B and Scenario CPage Adding a NetExtender Client Route Configuring a Default RouteSelect the Network Routes Select the NetExtender Client RoutesRoute Destination Network Subnet Mask Setting your NetExtender Address RangeScenario a 192.168.200.100 toScenario C Select the NetExtender Client SettingsPage Scenario a Connecting the SonicWALL Sslvpn  Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario C Configuring Your Network Interface Scenario B Connecting the SonicWALL SslvpnScenario C Connecting the SonicWALL Sslvpn Scenario a SSL VPN on a New DMZ  Configuring Your Gateway DeviceScenario a Connecting to the SonicWALL UTM Appliance Scenario a Allowing WAN DMZ Connection in SonicOS Standard Select the Network SettingsSelect the Firewall Access Rules Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B Allowing WAN DMZ Connection in SonicOS Standard Scenario B Connecting to the SonicWALL UTM ApplianceScenario B SSL VPN on Existing DMZ Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C SSL VPN on the LAN Scenario C Connecting to the SonicWALL UTM ApplianceScenario C Configuring SSL VPN LAN Connectivity Select Public Server Rule Scenario C Setting Public Server Access in SonicOS StandardEnter SSL VPN in the Server Name field Scenario C Setting Public Server Access in SonicOS EnhancedVerifying a User Connection from the Internet  Testing Your SSL VPN ConnectionContinue to Step Before You Register  Registering Your SonicWALL SslvpnRegistering with MySonicWALL Creating a MySonicWALL Account from System LicensesSonicWALL SSL VPN 4000 Getting Started Guide Click Continue CongratulationsConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Windows Configuring a Static IP AddressWindows XP Select Specify an IP Address Windows NTOpen Network  Mounting Guidelines Glossary of Networking Terms Page Cable Connections Lithium Battery WarningTrademarks Copyright NoticeSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc