Solved

How do I incorporate a different VPN tunnel device behind my Sonicwall TZ210

Posted on 2015-02-12
6
176 Views
Last Modified: 2015-02-19
I have a site that was set up with ISP managed router and a sonicwall TZ210 behind, currently establishing a VPN tunnel to my other facility.  Situation arose that I needed an additional VPN to connect to new location (fortinet).  I obtained additional Public IP from ISP, but it seems that my two VPN devices cannot run parallel because the second CIDR is somehow being statically routed to the first.  I need to get this two different VPN tunneling devices to work.  Is there a way to attached the Fortinet to the TZ210 and have it maintain a tunnel?  I really have no clue on how to get this work, and I don't understand why the ISP managed router cannot maintain the different CIDR so that my devices can route traffic accordingly.

Please help.
0
Comment
Question by:pscanevit
  • 3
  • 3
6 Comments
 
LVL 94

Expert Comment

by:John Hurst
ID: 40606960
I do not think you need an additional IP from your ISP for a new tunnel (I do not). Nor do you need another VPN box (I do not).

Please look in the configuration of the Sonicwall for the ability to add a new tunnel to a different location (external IP).

I do this with Cisco and Juniper and multiple tunnels work great. Sonicwall most likely allow multiple tunnels.
0
 

Author Comment

by:pscanevit
ID: 40606998
You are right. But this new device was prescribed to me by our new parent company and I was told to make it work
0
 
LVL 94

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40607007
I would pick one device, one IP and use that for multiple tunnels. Surely your parent company can understand this fairly simple reality.

Using multiple boxes and multiple external IP addresses into one company site just layers on complexity.  If you must do this and it is new ground for you, please get some consulting help. What you want to do is not simple.
0
MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

 

Author Comment

by:pscanevit
ID: 40607066
thank you I will let them know.  I am definitely not a fan of complexity and readily admit that I am not an Engineer by any stretch.   I just dont' know at this point if the sonicwall is going to connect to their Fortinet.  I have a Parallel setup working in another facility and it works fine.  Go figure.
0
 

Author Closing Comment

by:pscanevit
ID: 40618670
Thank you for the reinforcement.  I was able to plead my case on using existing device to establish additional connection
0
 
LVL 94

Expert Comment

by:John Hurst
ID: 40618717
@pscanevit  - Thanks for the update and I was happy to help.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Is your computer hacked? learn how to detect and delete malware in your PC
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question