Solved

Sonicwall Mesh VPN - General Rundown of Steps

Posted on 2009-07-09
1
2,244 Views
Last Modified: 2012-08-13
I have setup several Cisco mesh VPNs using DMVPN, and love how it works (very little configuration, once the main routers have been setup).

I have a client who is interested in setting up a mesh network of 30 locations, and they currently have 2-7yr old Sonicwall equipment at each location. The basic questions, is how does Sonicwall go about implementing their mesh VPN. From most of what I have read it is a hub, spoke methodology, where all spokes have to go through the hub (instead of spoke to spoke).

Will each location require explicit routes to each of the other locations, or do they have a Cisco DMVPN esque method whereby, the core routers, automatically advertise that routing to each of the spokes, and change the info dynamically.

In the long run, we are trying to figure out whether we should keep the Sonicwall setp, or go with Cisco, from an ease of use, and implementation standpoint.
0
Comment
Question by:aalbert69
1 Comment
 
LVL 13

Accepted Solution

by:
Ugo Mena earned 500 total points
ID: 24841524
a sonicwall "mesh" VPN should work in both configs (hub and spoke) and (spoke to spoke) but will require explicit routes to work in full spoke to spoke mode. However in the hub and spoke method, you can set static routes at the hub so that it will advertise routes and allow the spoke to spokes to communicate through the hub....but if your hub goes down so does your entire VPN mesh.
I prefer the spoke to spoke, but it requires explicit configs to each spoke and depending on the age/model of Sonicwalls they may not be up to snuff processor or connection wise if they are not at least the PRO series and/or if you are planning to use any of the Sonicwall premium services in addition to the VPNs. Double check the models to make sure.
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are two basic ways to configure a static route for Cisco IOS devices. I've written this article to highlight a case study comparing the configuration of a static route using the next-hop IP and the configuration of a static route using an outg…
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question