SonicWALL 4000 manual  Accessing the Management Interface

Page 7

Accessing the Management Interface

To access the Web-based management interface of the SonicWALL SSL VPN 4000:

1.Connect one end of a crossover cable into the X0 port of your

SonicWALL SSL VPN 4000. Connect the other end of the cable into the computer you are using to manage the SonicWALL SSL VPN 4000.

SonicWALL SSL-VPN 4000

X0

Management Station

2.Set the computer you use to manage the SonicWALL SSL VPN 4000 to have a static IP address in the 192.168.200.x/24 subnet, such as 192.168.200.20. For help with setting up a static IP address on your computer, refer to “Configuring a Static IP Address” on page 58.

Alert: A Web browser supporting Java and HTTP uploads, such as Internet Explorer

6.5or higher, Firefox 1.0 or higher, Opera 7.0 or higher, or Safari 1.2 or higher is recommended.*

3.Open a Web browser and enter http://192.168.200.1 (the default X0 management IP address) in the Location or Address field.

4.A security warning may appear. Click the Yes or OK button to continue.

*While these browsers are acceptable for use in configuring your

SonicWALL SSL VPN 4000, end users will need to use IE 6.5 or higher, Firefox 1.5 or higher, Opera 9.0 or higher, or Safari 2.0 or higher in order to take advantage of the full suite of applications.

Page 6

Image 7
Contents SonicWALL SSL VPN Getting Started Guide SonicWALL Sslvpn 4000 Appliance Getting Started Guide SonicWALL Sslvpn 4000 Configuration StepsBefore You Begin Check Package Contents Any Items Missing?What You Need to Begin Other Information Network Configuration InformationScenario C SSL VPN on the LAN Selecting a SonicWALL Recommended  Deployment ScenarioScenario a SSL VPN on a New DMZ Scenario BPower LED Test LED Alarm LED 2 Applying Power to the SonicWALL Sslvpn Accessing the Management Interface If You Cannot Login to the SSL VPN  Configuring Your SonicWALL Sslvpn Select Users Local Users Setting Your Administrator PasswordAdding a Local User Select the Users Local UsersConfiguring SSL VPN Network Settings Setting Time ZoneConfiguring DNS / Wins Select the Network Interfaces Configuring the X0 IP address for Scenario B and Scenario CPage Select the NetExtender Client Routes Configuring a Default RouteAdding a NetExtender Client Route Select the Network Routes192.168.200.100 to Setting your NetExtender Address RangeRoute Destination Network Subnet Mask Scenario aScenario C Select the NetExtender Client SettingsPage Scenario a Connecting the SonicWALL Sslvpn  Connecting the SonicWALL SslvpnScenario B Configuring Your Network Interface Scenario C Configuring Your Network Interface Scenario B Connecting the SonicWALL SslvpnScenario C Connecting the SonicWALL Sslvpn Scenario a Connecting to the SonicWALL UTM Appliance  Configuring Your Gateway DeviceScenario a SSL VPN on a New DMZ Select the Firewall Access Rules Select the Network SettingsScenario a Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario a Allowing DMZ LAN Connection in SonicOS Standard Interface Congratulations page, click Apply to create the access rule Create access to the LAN for NetExtender Select the Network Interfaces Add Service Group dialog box should display Server Private Network Configuration page, enter Click Next SSL VPN Click OK to create the object Click Add to create the rule Scenario B SSL VPN on Existing DMZ Scenario B Connecting to the SonicWALL UTM ApplianceScenario B Allowing WAN DMZ Connection in SonicOS Standard Public Server page, perform the following selections Scenario B Allowing DMZ LAN Connection in SonicOS Standard IP Address Begin Congratulations page, click Apply to create the access rule Continue to Step Scenario B Allowing WAN DMZ Connection in SonicOS Enhanced Server Private Network Configuration page, enter SonicWALL SSL VPN 4000 Getting Started Guide Scenario B Allowing DMZ LAN Connection in SonicOS Enhanced Click OK to create the object Click OK to create the rule Scenario C Configuring SSL VPN LAN Connectivity Scenario C Connecting to the SonicWALL UTM ApplianceScenario C SSL VPN on the LAN Select Public Server Rule Scenario C Setting Public Server Access in SonicOS StandardEnter SSL VPN in the Server Name field Scenario C Setting Public Server Access in SonicOS EnhancedVerifying a User Connection from the Internet  Testing Your SSL VPN ConnectionContinue to Step Creating a MySonicWALL Account from System Licenses  Registering Your SonicWALL SslvpnBefore You Register Registering with MySonicWALLSonicWALL SSL VPN 4000 Getting Started Guide Click Continue CongratulationsConfiguring Dynamic DNS Page SonicWALL SSL VPN 4000 Getting Started Guide Windows XP Configuring a Static IP AddressWindows Open Network Windows NTSelect Specify an IP Address  Mounting Guidelines Glossary of Networking Terms Page Cable Connections Lithium Battery WarningTrademarks Copyright NoticeSonicWALL SSL VPN 4000 Getting Started Guide Page SonicWALL, Inc