?
Solved

How Can I Access a Sonicwall Firewall from a SSLVPN Session

Posted on 2015-01-07
3
Medium Priority
?
156 Views
Last Modified: 2015-01-23
Hi All,
I just configured a new SSLVPN on a Sonicwal TZ-215 for a customer. Everything is working well, in the sense that I can get an IP and access the LAN Subnet. One thing I am trying to do though, is access the Sonicwall's internal IP 192.168.1.1 which I cannot. How do I allow this on the firewall? This should only work from within the SSLVPN not public. Everything public to office is blocked.

Thanks.
0
Comment
Question by:SpiderPig
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 18

Accepted Solution

by:
Don S. earned 2000 total points
ID: 40536755
If you look into the VPN policy for the ssl VPN, you will find and option called "Management via this SA:  If you check HTTP and HTTPS, you will be able to connect to the firewall from the SSLVPN.
0
 
LVL 7

Expert Comment

by:Network Zero
ID: 40537026
Select VPN > Settings.
Click the Edit icon next to the VPN policy over which remote management is desired.
Choose the Advanced tab.
Under "Management via this SA:" check HTTP, HTTPS or both.
Click OK.

then use 192.168.1.1:8080 or :4443
0
 

Author Closing Comment

by:SpiderPig
ID: 40567064
Worked! I also needed to make the user a Sonicwall Admin...
0

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question