Solved

Sonicwall Mesh VPN - General Rundown of Steps

Posted on 2009-07-09
1
2,167 Views
Last Modified: 2012-08-13
I have setup several Cisco mesh VPNs using DMVPN, and love how it works (very little configuration, once the main routers have been setup).

I have a client who is interested in setting up a mesh network of 30 locations, and they currently have 2-7yr old Sonicwall equipment at each location. The basic questions, is how does Sonicwall go about implementing their mesh VPN. From most of what I have read it is a hub, spoke methodology, where all spokes have to go through the hub (instead of spoke to spoke).

Will each location require explicit routes to each of the other locations, or do they have a Cisco DMVPN esque method whereby, the core routers, automatically advertise that routing to each of the spokes, and change the info dynamically.

In the long run, we are trying to figure out whether we should keep the Sonicwall setp, or go with Cisco, from an ease of use, and implementation standpoint.
0
Comment
Question by:aalbert69
1 Comment
 
LVL 13

Accepted Solution

by:
Ugo Mena earned 500 total points
ID: 24841524
a sonicwall "mesh" VPN should work in both configs (hub and spoke) and (spoke to spoke) but will require explicit routes to work in full spoke to spoke mode. However in the hub and spoke method, you can set static routes at the hub so that it will advertise routes and allow the spoke to spokes to communicate through the hub....but if your hub goes down so does your entire VPN mesh.
I prefer the spoke to spoke, but it requires explicit configs to each spoke and depending on the age/model of Sonicwalls they may not be up to snuff processor or connection wise if they are not at least the PRO series and/or if you are planning to use any of the Sonicwall premium services in addition to the VPNs. Double check the models to make sure.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Juniper VPN devices are a popular alternative to using Cisco products. Last year I needed to set up an international site-to-site VPN over the Internet, but the client had high security requirements -- FIPS 140. What and Why of FIPS 140 Federa…
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now