Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1147
  • Last Modified:

Setup server on DMZ with ports 443 open behind Sonicwall Firewall

I need to know how to configure a sonicwall to allow port 443 traffic from outside to server on DMZ
0
johnnypinaz
Asked:
johnnypinaz
  • 3
  • 2
  • 2
  • +1
2 Solutions
 
smallinternetsolutionsCommented:
i think this is what your looking for:
The Services page displays the Network Access Rules (By Service) table. Rules are sorted from the most specific at the top, to less specific at the bottom of the table. At the bottom of the table is the Any rule. The Any rule is all IP services except those listed in the Services page. Rules can be created to override the behavior of the Any rule; for example, the Any rule allows users on the LAN to access all Internet services, including NNTP News. However, LAN access to NNTP can be unblocked by deselecting LAN Out corresponding to the NNTP News service.

Network Access Rules are management tools that allow you to define inbound and outbound access policy, configure user authentication, and enable remote management of the SonicWALL. By default, the SonicWALL’s stateful packet inspection allows all communication from the LAN to the Internet, and blocks all traffic to the LAN from the Internet. The following behaviors are defined by the “Default” stateful inspection packet rule enabled in the SonicWALL:

•Allow all sessions originating from the LAN to the WAN and DMZ.

more info http://help.mysonicwall.com/sw/eng/general/ui1/6600/Access/Services.htm
0
 
digitapCommented:
what model of sonicwall and is it enhanced or standard os...this can be found one the System > Status page.

if enhanced, you can use the public server wizard.

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=7027


if standard.

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=3703
0
 
NoduzzCommented:
There are few things you need to do:

The first thing you need to do is add a couple network address objects, one for the external IP address and one for the internal IP address.  Then you need to setup a NAT policy allowing all traffic (or just the specific HTTPS traffic if you want to be more secure) that would point the external IP to the internal IP, the other thing is you need to add a Firewall Access Rule that allows HTTPS traffic to the external IP address object from your WAN to LAN.  
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
NoduzzCommented:
Er sorry I meant from WAN to DMZ not LAN.
0
 
johnnypinazAuthor Commented:
I think Im closer but now I realise my DMZ doesnt talk to my lan. Im sure there is no rule for that. I tried to make a rule that said just let all services go through but that didnt work. I cant even ping a server of the gateway from lan to DMZ or the other way around
0
 
digitapCommented:
it depends on if you created the DMZ to be trusted.  you can determine this by going to firewall > DMZ to LAN and vice versa.  my guess is it's deny.
0
 
NoduzzCommented:
Yeah by default DMZ to LAN traffic is disabled (and for good reason) that being said you should be able to create a rule from your DMZ to LAN without a problem you just need to make sure the rule is a higher priority than the new all traffic which it shouldnt let you create on under it so i'm not sure why that would be not working.  Have you verified your address objects are the correct IPs?  When you send traffic over that connection do you see anything in your logs about it being blocked?
0
 
johnnypinazAuthor Commented:
Thanks everyone. It was a little of everything. Improper rules mostly. I did learn something huge though. I never knew you could set priorities for rules. Thanks for all of your help! Im working great now.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

  • 3
  • 2
  • 2
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now