SonicWall SSL-VPN, no Internet connectivity for clients

Hello,
    We have a SonicWall NSA220 and we are trying to route all internet traffic from laptops and iOS devices through the SSL-VPN. However, with tunnel all mode enabled, the internet on the client does not work. I originally had it configured with tunnel all mode disabled, but then the WAN IP shown on the client was not the WAN IP of the office network. How can I route all internet traffic through the SSL-VPN?

Thank you!
indigo6Asked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
Blue Street TechConnect With a Mentor Last KnightsCommented:
Ah I see.

To allow your end users access to internet over the UTM-SSLVPN, you will need to allow “WAN RemoteAccess Networks” (a network address object whose value 0.0.0.0 acts like a default route), and the Tunnel All option must be selected on the Client Routes page.  The method below is appropriate when the administrator wants all of their NetExtender users to have their internet access provided through the SSL-VPN otherwise disable Tunnel All mode.  Be sure that you are not overwhelming the internet bandwidth at the location where the firewall is installed, as this traffic will be added to the other loads from inside the network.
Step 1: On the SonicWALL, go to SSL-VPN > Client Routes screen, enable the Tunnel All option in the drop down menu.

Step 2: On the Users > Local Groups screen, configure SSLVPN Services group and under tab “VPN Access,” add the object WAN RemoteAccess Networks.

Step 3: No custom rules are needed on the Firewall > Access Rules screen for this to work.  You can see auto-added rules in the section SSLVPN to WAN.
Make sense?
0
 
InfamusCommented:
Try this.

http://www.sonicwall.com/downloads/advanced_vpn.pdf

ctrl+f and search for "split tunnel".
0
 
Blue Street TechLast KnightsCommented:
Hi indigo6,

SSL-VPN > WAN Traffic.
To pass traffic from SSL-VPN to WAN you should manually add an Access Rule SSL-VPN > WAN Allow.

Tunnel All mode.
Tunnel All mode routes all traffic to and from the remote user over the SSL-VPN NetExtender tunnel —including traffic destined for the remote user’s local network. This is accomplished by adding the following routes to the remote client’s route table:

IP Address    Subnet mask
0.0.0.0            0.0.0.0
0.0.0.0            128.0.0.0
128.0.0.0        128.0.0.0

NetExtender also adds routes for the local networks of all connected Network Connections. These routes are configured with higher metrics than any existing routes to force traffic destined for the local network over the SSL-VPN tunnel instead. For example, if a remote user has the IP address 10.0.67.64 on the 10.0.x.x network, the route 10.0.0.0/255.255.0.0 is added to route traffic through the SSL VPN tunnel.

Tunnel All mode is configured on the SSL VPN > Client Routes page.

May I ask what the overall goal is here?
0
Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

 
indigo6Author Commented:
Hi, thanks for your input. What I am trying to accomplish is more security for remote employees. When they are on the go, I want all their network traffic to pass through the SSLVPN. I have an access rule in the SSLVPN > WAN zone already (screenshot attached), but I still can't browse the internet from a remote client. The network just hangs.

Thanks!
0
 
Blue Street TechLast KnightsCommented:
There is no attachment.

Try disabling Windows firewall and retest.
0
 
indigo6Author Commented:
No go. :( Also, the iOS app doesn't seem to allow network access with tunnel all mode enabled.
0
 
Blue Street TechLast KnightsCommented:
Hmm, I haven't come across that. So are you looking into the app under routes and it's not showing that? If not, how did you determine that?
0
 
indigo6Author Commented:
I've attached a screenshot. Thanks!
photo.PNG
0
 
indigo6Author Commented:
Sorry for not responding in a timely manner. This got put on the backburner for a while. However, it worked! Thanks! It's obscenely slow, but that's fine for now. Thanks!
0
 
Blue Street TechLast KnightsCommented:
Great glad I could help and thanks for the points!

If its exceptionally slow it isn't because of the setup...the setup is straightforward in fact all we are doing is setting routing here. To correct transmission issues take a look here and change your MTU value: http://www.experts-exchange.com/A_12615.html

Cheers!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.