Solved

SonicWall Configuration for VPN Access

Posted on 2010-11-24
7
655 Views
Last Modified: 2012-05-10
We are attempting to force traffic over a (second) VPN from an outside agency. We re running a SonicWall NSA 240 and the agency is running a Cisco device.  The connection between us has been successfully established but, for example, FTP traffic never reaches the intended server. Here are the particulars:

a.      the VPN is established.
b.      The agency NATs all of their outbound traffic over a single IP
c.      The FTP server works over our own VPN or, if I turn it on, over the WAN interface. Accordingly, it also works for the agency (no surprise there) if that access rule is activated.
d.      An access rule (network) has been created to support the NAT-ed address over the VPN
e.      A firewall access rule has been created for:  VPN > LAN and VPN > WAN to the host for the agency network as well as VPN <-> WAN (X1 Subnet, both ways) to support the agency VPN connection.
f.      The appropriate protocols have been activated on the host and have been tested.

The agency performed a TRACERT and it would seem that they can get to our system, but I’m not seeing it on the firewall logs. They are reporting “connection refused”.

It would seem that we’re missing something simple.  I compared the settings with our existing VPN, and all is accounted for.  The biggest difference is that they are NAT-ing to a single address. Further, I’m not sure that will work when we bring on clients to access our applications.

Thanking you in advance for your insight.  Greatly appreciated.

Happy Thanksgiving!
0
Comment
Question by:MSConsulting
  • 3
  • 2
7 Comments
 
LVL 33

Expert Comment

by:digitap
ID: 34205431
hello - NAT'ing to a single IP should be fine.  i have several clients doing this over a VPN.  are you running any security services on the VPN zone?  IPS can block FTP traffic if configured to do so.
0
 

Author Comment

by:MSConsulting
ID: 34206146
Thanks for the quick response. No, I'm not running any security on the firewall/VPN zone(s).  Perhaps you could outline the steps necessary to set up the NSA so that I can support access to my servers over the VPN. Like I said, I set it up for our private network and it works fine.  It's a spoke-hub configuration, where the applications servers are at the hub and we're just adding another "spoke".

Cheers,
Marc
0
 
LVL 33

Expert Comment

by:digitap
ID: 34206347
OK...read through your particulars.  when setting up a VPN, you typically don't have to configure any firewall access rules.  default allows all of the hosts specified in the address object (group) of the VPN SA and any services.  i've gone back and tweaked the access rules to lock down services, but i don't do this often.

i need some clarification on the NAT part.  are they NAT'ing such that their network (Destination Networks) appears as a single IP address or your network (Local Networks) appears as a single IP address?

Are you performing any NAT work on your sonicwall?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:MSConsulting
ID: 34209211
Thanks again. I would have thought as much about VPNs (re: firewall access rules).  I will relook to see if I've compromised anyting in my setup.

They are NAT'ing so that their network looks like a single IP.  
Yes, we are performing some NAT'ing on our network. Specifically, the target server is NAT'ed to translate the public address to the private one. It might be helpful to know that they are using the server's public address when trying to engage its services.

Cheers,
M.
0
 
LVL 33

Accepted Solution

by:
digitap earned 250 total points
ID: 34209238
ok...getting a clearer picture.  NAT'ing as in WAN > LAN has nothing to do with VPN > LAN.  they SHOULD be using the private IP address of the server as it is on your LAN and NOT the public IP address.  doing so will not send the traffic over the VPN.

the address object representing the Destination Network should be the single IP address that they are NAT'ing their LAN to.
0
 
LVL 69

Expert Comment

by:Qlemo
ID: 34415371
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Optimal Xbox 360 connectivity requires "OPEN NAT". If you use Juniper Netscreen or SSG firewall products in a home setting, the following steps will allow you get rid of the dreaded warning screen below and achieve the best online gaming environment…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question