Avatar of Yashy
Yashy
Flag for United Kingdom of Great Britain and Northern Ireland asked on

Routing on Sonicwall Firewall (diagram attached)

hey guys

I've attached a diagram on here to better describe my problem.

We have a warehouse at Site A. They have a VPN directly to our head office at Site B. At both of these sites we have a Sonicwall fireall (one is a TZ 210 and another an NSA 3500).

From Site B, have a VPn connection to our hosting provider. So we use a LAN IP to connect to a remote desktop services session using a 10.45.190.0/24 address.

However, we want people at site A to be able to remote desktop on to the 10.45.190.0/24 network by routing it via Site B. How can I do it so that somebody at a PC at Site A is able to remote desktop onto the 10.45.190.0 network in that way? (i.e. routing it via Site B)

Many thanks
Yashy
Routing-Warehouse-to-Attenda.jpg
Hardware FirewallsNetwork SecurityNetwork Architecture

Avatar of undefined
Last Comment
crouthamela

8/22/2022 - Mon
crouthamela

1. At Site A - Create an Address Group that includes an object for Site B's network and External Company's network. Make that the Destination for the VPN.
2. At Site B - Create an Address Group that includes an object for Site A's network and the LAN of Site B. Make that the Local network for the VPN to External Company.
3. At External Company - Have them add the network for Site A to their Destination Networks definition for the VPN.

All objects specified would be members of the VPN Zone.
Frank McCourry

Setup a static route on site A's sonicwall that will take all traffic destined for 10.45.190.0 to to the IP address of Site B's VPN tunnel to External Company.

ie..

If Site B's VPN gateway (from B to External Company) address is 10.0.0.1 The you need a static route on Site A that directs all traffic destined for 10.45.190.0 to 10.0.0.1.
crouthamela

@frankmcc - That wouldn't work without the Address Group and changes to the VPNs I specified above. If the networks in question are not part of the Security Association for the VPN tunnel you can't make a static route to send traffic over it. They won't match the allowed traffic and will be dropped.
Experts Exchange is like having an extremely knowledgeable team sitting and waiting for your call. Couldn't do my job half as well as I do without it!
James Murphy
Frank McCourry

You could setup a separate tunnel from Site A to the External Company...
Yashy

ASKER
@ - frankmcc. We're unable to do that for the meantime.

@ - crouthamela - I'm a little confused, not because of your explanation, but because I don't know how to do that on the actual firewall.
crouthamela

To create an Address Group, go to Network -> Address Objects.

To change the Destination/Local selections for the VPNs, go to VPN and click the Configure icon for your VPN tunnel in question. Then go to the Network tab to make your selections.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Yashy

ASKER
Okay, I get it now mate. Thanks for that.

Out of curiosity, is this method possible at all:

1) Have Sonicwall at Site A route any attempted RDP traffic to 10.45.190.0 network to be directed to the Sonicwall at site B.

And seeing as Sonicwall B already routes' traffic over the VPn to the external site, that it would automatically be taken care of?

I'm asking these questions purely from lack of experience. Thanks mate.
crouthamela

The steps I provided above do exactly that, all traffic headed for the External Company will go through the VPN to Site B, then to the External Company. But the External Company is going to need to add the network (10.0.200.0/24) for Site A to their side of the VPN for the return traffic to route properly.
Yashy

ASKER
Thanks a lot Crouthamela.

I'm creating a new group in the Sonicwall at Site A and adding the network at site B and the external company into it. However, what Zone Assignment should I give them when adding?

So when I add the add an Object for Site B. Should it be under the 'LAN' Zone Assignment and the 'Type' as being Network?
Experts Exchange has (a) saved my job multiple times, (b) saved me hours, days, and even weeks of work, and often (c) makes me look like a superhero! This place is MAGIC!
Walt Forbes
crouthamela

Use the Zone LAN for only local stuff to the SonicWALL you are on. If you are making an object for a network at another site, then the Zone will be VPN.
Yashy

ASKER
Okay, I've set it all up. External company called me to say that they have opened up their VPN traffic for RDP coming from the 10.0.200.x network.

However, Site A is still unable to connect to the remote desktop services at the external company.

I am at Site B and I can still connect to the external company's remote desktop, even after the changes were made.

Any ideas where I can look to find where the issue is?
crouthamela

What networks show as "up" with the green dot at eat SonicWALL? You should have two for each VPN now.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Yashy

ASKER
Well only one for each still. What I did was at Site A, in the VPn it already had up I merely added the 'External company' VPN zone into it.

Then at site B, I added Site A network object in to the already existing VPN connection to the external company.

Then the external company told me that they opened up the firewall at their end for RDP traffic from anything at 10.0.200.0 network.

I thought doing this was exactly what you mentioned. No?
crouthamela

Oh I'm sorry I missed a step. At Site B, add to the Address Group that has Site A and the LAN subnet in it, an Address Object for the External Company. That should bring up the External Company network from Site A -> Site B in the VPN status.
Yashy

ASKER
Still not working Crouthamela. I did that and I'm not able to connect from Site A to the External Company using the local 10.45.190.10 ip in remote desktop. I can though when I am at Site B still.

I've attached screenshots of the VPN at Site A. And the one at Site B.

And here are the details for the VPN connections along with the groups settings.

Site A VPN:

From -> Site A Local LAN (10.0.200.0/24)
(the below two are in one group)
To-> Site B LAN (10.0.0.0/24, Zone: VPN)
        External Company (10.45.190.0/27)

Site B VPN:
(the below three are in one group)
From -> Site B Local LAN (10.0.0.0/24)
              Site A LAN (10.0.200.0/24, Zone: VPN)
              External Company (10.45.190.0/27, Zone VPN)

To -> External Company (10.45.190.0/27, Zone VPN)
Sonicwall-on-Site-A.jpeg
Sonicwall-at-Site-B.jpg
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
William Peck
Yashy

ASKER
Maybe it's because of the fact that the security used between Site B to external company is higher and therefore the same needs to be used between Site A to Site B VPN?
Yashy

ASKER
I just spoke to Sonicwall. After 1hr of playing around, they ouldn't do it. Then they said the only way was to configure what's called a 'Hub' and 'Spoke' configuration.They're sending me the link, but I was wondering surely that's not possible?! There must be a way without doing this?
crouthamela

We'll get it working, what you posted in the big post above is good, thank you for the info. What I see looks correct there, but can you provide the same information at Site B for the Site B -> Site A VPN?

What networks/address objects/groups are involved, with screenshot?

One note: At Site B, don't have the External Company network in your "From" Address Group.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Yashy

ASKER
Welcome sir:).

So Site B to Site A VPN:

From-> Site B LAN (10.0.0.0/24, Zone: LAN)

To ->Site A LAN (10.0.200.0/24, Zone: VPN


At Site B in the 'From' group, I did include the External company. If you look again, I've shown it:

From -> Site B Local LAN (10.0.0.0/24)
              Site A LAN (10.0.200.0/24, Zone: VPN)
              External Company (10.45.190.0/27, Zone VPN)
ASKER CERTIFIED SOLUTION
crouthamela

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
Yashy

ASKER
Okay, I've configured everything as you have said. I'll even show you the screenshot for the two lights that have shown up at Site A.

But still Site A can't connect to External Company. I've also tried to log on to the servers at External Company and attempt to ping the Site A gateway and it doesn't. So it's a two way thing.

Can it be the firewall at the end of the External Company would you think not properly opened up?
Sonicwall-at-Site-A.jpeg
crouthamela

Ok good. Since you have the External Company network "up" between Site A and B, half the battle is over. I do suggest changing the proposal to IKEv2 (preferably with AES-256) to help with renegotiations and keeping the tunnel up.

As for the other half, it does appear to be an issue at the External Company. When you view you VPN Status area on Site B, does it show 10.0.200.0 as a network connected to External Company? It will show below the VPNs. If not, you'll have to diagnose that with the External Company.
Your help has saved me hundreds of hours of internet surfing.
fblack61
Yashy

ASKER
hi mate,

Yes, in reference to what you're saying I've got a screenshot showing also Site B to External Company.

Should I try anything like routing tables? Should I attempt to add any route entries from Site A at all?
VPNS.jpg
Yashy

ASKER
WORKED!!!

It was the external company, they had something to do with the front facing and backfacing firewalls requiring the changes to be updated.

Dude, it worked!!! WAHHOOOOOOO.

Much appreciate your helped Crouthemela. I'd offer you beers if I could.
crouthamela

Hah, told you we would get it.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
crouthamela

Also for future reference, what we are doing on Site B is called "VPN Hairpinning". If everything looks good, I'll just take the points, no beer necessary. :)
Yashy

ASKER
Legend mate, legend. Sonicwall didn't even get it right..lol.

Now a quick question. I want to get myself trained up on these firewalls and learn, but I want to do this....fast, as in within the next 2-3 months I want to immerse myself.

I've got two test Sonicwalls, along with two different internet lines which I can play around with. But I want to learn the basics to slightly more complex things. What would you suggest as a method to immerse myself into an environment where I can learn quickly? Sadly courses are rarely good, as they never teach you real scenarios.

Are there people out there who teach privately?
Thanks man.
Yashy

ASKER
I'll close this for now dude. No need to answer that. I'm sure I'll find a way.

You've been a huge help, massive. Thanks a mil.
This is the best money I have ever spent. I cannot not tell you how many times these folks have saved my bacon. I learn so much from the contributors.
rwheeler23
crouthamela

Best suggestion I can give is to go at least go through the Sonicwall Network Security Essentials course. Either for free online (http://www.sonicwall.com/us/support/eLearning.html) or through a training company like Global Knowledge (http://www.globalknowledge.com/training/course.asp?pageid=9&courseid=11193&catid=191&country=United+States).

This more advanced stuff they don't cover though. I manage 800+ Sonicwalls everyday, each with VPNs on it. So I have just ended up learning ways to accomplish things over time. As you saw, even Sonicwall support really doesn't know how to do it unless you get to the Tech 2/3 guys. Other stuff that may help is training material for CCNP Security as Cisco always goes into great detail on technologies they certify on.

As for private training, I have been producing videos on YouTube lately (http://www.youtube.com/ShrikeCast), but have only covered basic things so far. Eventually I'll get more advanced, but not yet. I'd be willing to privately train you if you're near PA/NJ/NY, else we could do an e-learning type thing. Unfortunately SonicWALL is rather strict on who become an official trainer though to do the CSSA certification course trainings; I actually tried to do that myself last year (I'm already a Cisco instructor) and had to deal with too much flak about territories with Global Knowledge and others.
Yashy

ASKER
Ah, politics with companies ey?

I'm sadly based in the UK, so unless I cought a flight over, I would be willing to attempt the elearning. I'm sure we can attempt the e-learning stuff somehow. I'm sure I can find you on linkedin or the like.

Again, from the last post to the help on the Sonicwall VPN. Thanks again.
crouthamela

⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.