Sonicwall site to site VPN, no access to remote network

Posted on 2014-07-28
Medium Priority
Last Modified: 2014-07-29
Some info for the below scenario.

Site A -
Site B -

Sonicwall at Site A -
Sonicwall at Site B -

I have a site to site VPN active between two remote locations.  The VPN is established fine.  People at site B can access the server at site A.  I log on to the server ( at site A and I try to go to the web management page for the Sonciwall at site B and I cannot acess.  I CAN ping from the server with no issue.  I also want to access a network Buffalo drive which is at Site B.  The address is  I want to access this from the server at Site A ( and I cannot do so.

Again, people at site B CAN access servers and data at site A.  As far as I know everything on both Sonicwalls are set the same.

Does anyone have any thoughts?
Question by:pgoldwasser
  • 3
  • 2
  • 2
  • +1

Expert Comment

ID: 40224775
At site B is there an "access list" that allows the site A subnet range to access site B.

Author Comment

ID: 40225284
At site B there is a firewall rule that is allowing all traffic from the A subnet range to access site B.

Expert Comment

ID: 40225360
is that firewall rule allowing https? Can you post the configuration from both firewalls for comparison?
KuppingerCole Reviews AlgoSec in Executive Report

Leading analyst firm, KuppingerCole reviews AlgoSec's Security Policy Management Solution, and the security challenges faced by companies today in their Executive View report.

LVL 20

Expert Comment

ID: 40226307
When configuring the STS VPN did you remember to define the network access at Site B on the VPN config, Network tab, similar to what you did on the Site A Sonicwall.

Assisted Solution

by:Peter Wilson
Peter Wilson earned 2000 total points
ID: 40227713
You have to enable Management on the VA on the applicable Zone.

Author Comment

ID: 40228078
Here are the specific settings on both Sonciwalls.  Unfortunately I cannot download the config to a file like on a Cisco device.

Site A (main office with the file server)
VPN Zone is set to Allow Interface Trust
Address Object VPN_SiteB -
Firewall LAN > VPN
LAN      >      VPN         1      LAN Primary Subnet                     VPN_SiteB       Any      Allow
LAN      >      VPN         2      WAN RemoteAccess Networks     Any                      Any      Allow
LAN      >      VPN         3      WLAN RemoteAccess Networks   Any                      Any      Allow
Firewall VPN > LAN
VPN      >      LAN         1      VPN_SiteB      LAN Primary Subnet    Any                              Allow      
VPN      >      LAN         2      Any                     All Interface IP                  SNMP                              Allow      
VPN      >      LAN         3      Any                     All Interface IP                  SSH Management      Allow      
VPN      >      LAN         4      Any                     All Interface IP                  HTTPS Management      Allow      VPN      >      LAN         5      Any                     All Interface IP                  HTTP Management      Allow      VPN      >      LAN         6   Any                     All X0 Management IP      SNMP                      Allow      
VPN      >      LAN         7   Any                     All X0 Management IP      Ping                              Allow
VPN Settings > Network page
Local Network - LAN Primary Subnet
Remote Network - VPN_SiteB

Site B - Remote Network
VPN Zone is set to Allow Interface Trust
Address Object - VPN_SiteA -
Firewall LAN > VPN
LAN      >      VPN         1  LAN Subnets                                      VPN_SiteA     Any      Allow
LAN >      VPN     2  WLAN RemoteAccess Networks      Any                    Any      Allow
Firewall VPN > LAN
VPN >       LAN    1  Any                  All X0 Management IP                SNMP      Allow      
VPN >       LAN    2  Any                      All X0 Management IP                  Ping      Allow      VPN >       LAN    3  Any                      All Interface IP                            HTTPS      Allow      VPN >       LAN    4      VPN_SiteA      LAN Subnets                                  Any      Allow      
VPN >       LAN    5  Any                      WLAN RemoteAccess Networks Any      Alloow
VPN Settings > Network Page
Local Network - LAN Subnets
Remote Networks - VPN_SiteA

I think that is all of the settings that are pertinant.  Most of the firewall rules are created when the VPN is created and cannot be edited.  So again, SiteB can access data at SiteA but not the other way around.


Accepted Solution

Peter Wilson earned 2000 total points
ID: 40228155
it looks like you don't have management setup in site B. Site A has the following for mgmt.:

VPN      >      LAN         5      Any                     All Interface IP                  HTTP Management      Allow  

You configure this within the VPN Policy within Site B.

Author Comment

ID: 40228205
"You have to enable Management on the VA on the applicable Zone."

I do not see how to enable Management on the zone.  Management can only be enabled on the interface, and that is either LAN or WAN.  If enabled on the LAN zone, I should be able to use it through the VPN.  I could live without this if only I could access data on SiteB from SiteA.

Featured Post

The eGuide to Automating Firewall Change Control

Today’s IT environment is constantly changing, which affects security policies and firewall rules. Discover tips to help you embrace this change through process improvement & identify areas where automation & actionable intelligence can enhance both security and business agility.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question