Setup server on DMZ with ports 443 open behind Sonicwall Firewall

I need to know how to configure a sonicwall to allow port 443 traffic from outside to server on DMZ
johnnypinazAsked:
Who is Participating?
 
NoduzzCommented:
Yeah by default DMZ to LAN traffic is disabled (and for good reason) that being said you should be able to create a rule from your DMZ to LAN without a problem you just need to make sure the rule is a higher priority than the new all traffic which it shouldnt let you create on under it so i'm not sure why that would be not working.  Have you verified your address objects are the correct IPs?  When you send traffic over that connection do you see anything in your logs about it being blocked?
0
 
smallinternetsolutionsCommented:
i think this is what your looking for:
The Services page displays the Network Access Rules (By Service) table. Rules are sorted from the most specific at the top, to less specific at the bottom of the table. At the bottom of the table is the Any rule. The Any rule is all IP services except those listed in the Services page. Rules can be created to override the behavior of the Any rule; for example, the Any rule allows users on the LAN to access all Internet services, including NNTP News. However, LAN access to NNTP can be unblocked by deselecting LAN Out corresponding to the NNTP News service.

Network Access Rules are management tools that allow you to define inbound and outbound access policy, configure user authentication, and enable remote management of the SonicWALL. By default, the SonicWALL’s stateful packet inspection allows all communication from the LAN to the Internet, and blocks all traffic to the LAN from the Internet. The following behaviors are defined by the “Default” stateful inspection packet rule enabled in the SonicWALL:

•Allow all sessions originating from the LAN to the WAN and DMZ.

more info http://help.mysonicwall.com/sw/eng/general/ui1/6600/Access/Services.htm
0
 
digitapCommented:
what model of sonicwall and is it enhanced or standard os...this can be found one the System > Status page.

if enhanced, you can use the public server wizard.

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=7027


if standard.

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=3703
0
WEBINAR: 10 Easy Ways to Lose a Password

Join us on June 27th at 8 am PDT to learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees. We'll cover the importance of multi-factor authentication and how these solutions can better protect your business!

 
NoduzzCommented:
There are few things you need to do:

The first thing you need to do is add a couple network address objects, one for the external IP address and one for the internal IP address.  Then you need to setup a NAT policy allowing all traffic (or just the specific HTTPS traffic if you want to be more secure) that would point the external IP to the internal IP, the other thing is you need to add a Firewall Access Rule that allows HTTPS traffic to the external IP address object from your WAN to LAN.  
0
 
NoduzzCommented:
Er sorry I meant from WAN to DMZ not LAN.
0
 
johnnypinazAuthor Commented:
I think Im closer but now I realise my DMZ doesnt talk to my lan. Im sure there is no rule for that. I tried to make a rule that said just let all services go through but that didnt work. I cant even ping a server of the gateway from lan to DMZ or the other way around
0
 
digitapCommented:
it depends on if you created the DMZ to be trusted.  you can determine this by going to firewall > DMZ to LAN and vice versa.  my guess is it's deny.
0
 
johnnypinazAuthor Commented:
Thanks everyone. It was a little of everything. Improper rules mostly. I did learn something huge though. I never knew you could set priorities for rules. Thanks for all of your help! Im working great now.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.