• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 62
  • Last Modified:

SonicWall Router - VPN Tunnel

Hi Experts,

I’m working on creating a vpn tunnel to a 3rd party host.  The host is sharing their server among a few of the clients.  When setting up a vpn tunnel, the router tech informed me that an existing client is already using the same network addressing scheme as we are.

Is it possible to emulate another network and ultimately have it connect seamlessly onto our network?  This is a client\server configuration so the entire Lan Primary SubNet  will need to access the cloud resource.

We are on 10.0.0.x \ They are on 192.168.250.x

Not sure if this is correct, but I setup the VPN tunnel up to this point as:
Local Network is: should be 10.0.0.0, but I crated 10.0.15.0 thinking I can create a route translation
Destination is: 192.168.250.0

When I attempted to connect the tunnel, of course I get an invalid cookie error which means I don't know what I am doing.

Thanks for any help you can provide.
0
byd2k
Asked:
byd2k
  • 4
  • 2
1 Solution
 
Michael OrtegaSales & Systems EngineerCommented:
Couple leading questions.

Is it just one device on your end that needs to communicate with them?

If it's multiple devices on your end that need to access the remote end is the initiation of traffic always from your side?

MO
0
 
carlmdCommented:
"an existing client is already using the same network addressing scheme as we are'

This represents a problem when your LAN subnet is the same as that of another connection.

You example "We are on 10.0.0.x \ They are on 192.168.250.x" does not reflect that.

What am I missing here?
0
 
J SpoorTMECommented:
You can do NAT over VPN
see: https://support.software.dell.com/kb/sw7759

View more example configurations and the SonicWALL webui and features on http://livedemo.sonicwall.com or http://ngfw-demo.com
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 
Michael OrtegaSales & Systems EngineerCommented:
@carlmd,

I thinking byd2k was referring to the 192.168.250.x subnet being the destination subnet. The local subnet of 10.0.0.x conflicts with some other branch already connected.

MO
0
 
J SpoorTMECommented:
Let me do this by example,
I have a 192.168.222.0/24 subnet at home, have a VPN tunnel to corporate but they require me to use a 10.z.y.x/24.
The VPN config has 10.z.y.x as source network and corporate as destination network.
I then added NAT policy to translate 192.168.222.x to 10.z.y.x.
You will have to add a LAN to VPN access rule for the original 192.168.222.0 network as the auto created rule is done on 10.z.y.x


The other side of the VPN tunnel must use 10.z.y.x as destination network.

So in your case
NAT 10.0.0.0/24 to 10.0.15.0/24 create the VPN tunnel with src = 10.0.15.0/24 and dst = 192.168.250.0/24
make a LAN to VPN firewall rule for 10.0.0.0/24 to 192.168.250.0/24
0
 
J SpoorTMECommented:
Did this help?
0
 
J SpoorTMECommented:
No response
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

  • 4
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now