Solved

Traffic is only allowed to secured peers

Posted on 2013-05-30
5
1,795 Views
Last Modified: 2013-05-31
I try to connect to the network from outside the office to a Sonicwall NSA 3500 using the Sonicwall Global VPN Client (v4.2.0305). I get a connection waring saying "Traffic is only allowed to secured peers". If I hit yes it connects me to the network and I am able to get to my network drives and devices. The problem is that internet stops working such as webpages, emails, etc. If I hit "no" I am disconnected.
connection-warning.JPG
0
Comment
Question by:bmtservicedesk
5 Comments
 
LVL 38

Assisted Solution

by:Aaron Tomosky
Aaron Tomosky earned 166 total points
Comment Utility
Yep. It's requiring all traffic to go through the sonicwall so you can't get to local resources. Sometimes called default/forced remote gateway.

So there are two ways to go about this. One: allow traffic from the VPN zone to the wan so you can talk to the Internet through the VPN. Two: don't force remote gateway so you can access local resources and direct access to the Internet. Only vpn traffic goes through the VPN.
0
 
LVL 17

Assisted Solution

by:surbabu140977
surbabu140977 earned 334 total points
Comment Utility
This comes for normal sonicwall vpn client when the VPN connection policy allows
only traffic to the gateway. The problem is the network administrator who configured the Sonicwall NSA 3500, he did it in a not so correct way.  You cannot do anything here.

Ask your network admin to enable/configure split tunneling in the gateway. It will be solved.
Should be a less than 5 min job. : )

Best,
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 334 total points
Comment Utility
FYI, the settings is in WAN GroupVPN Policy-->advance-->set default gateway to 0.0.0.0--> Client tab---> Set Allow Connections to - Split Tunnels--->Set Default Route as this Gateway--->click ok.

If you are running sonicOS enhanced, the settings are different.

That's it.

Best,
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
0
 

Author Closing Comment

by:bmtservicedesk
Comment Utility
thanks for the help, easier than we thought.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now