Link to home
Start Free TrialLog in
Avatar of stinnett2000
stinnett2000

asked on

SonicWall and Cox CIDR Block accessible via WAN

I have a customer who received a CIDR block of IP’s to add to their SonicWall. They have a single IP that is currently used as the WAN IP. I need to configure the SonicWall to utilize this new CIDR IP range along with the current WAN. I want the internal computers to be “seen” as one of the CIDR IP addresses that will be assigned to it or via NAT. I was able to get it configured as a DMZ however the computers in the DMZ all appeared to the internet as the WAN IP address. I want them to appear as each individual CIDR IP. I would prefer to utilize NAT and have these new CIDR IP’s routed to the current 192.168.1.xxx range however I could also utilize the DMZ and have these computers assigned their own CIDR IPs.

The IP’s are similar, but different ranges and subnets:

IP for the WAN is 98.189.xxx.xxx / Mask: 255.255.255.128

They have a new CIDR block with this setup. The xxx in the CIDR are NOT the same as the WAN single IP above.
Subnet: 98.189.xxx.64/26
NetMask: 255.255.255.192
Suggested Default Gateway: 98.189.xxx.65
First Useable: 98.189.xxx.66
Last Useable: 98.189.xxx.126
Broadcast: 98.189.xxx.127

I have come across a few different similar suggestions however I’m sure I am not doing something correctly as none of these have worked for me.

https://www.experts-exchange.com/questions/28001275/Networking-CIDR-Routing-TMG2010.html
https://www.experts-exchange.com/questions/28566277/Configure-Sonicwall-for-CIDR-block-with-a-Host-IP.html
https://www.sonicwall.com/support/knowledge-base/configuring-multiple-wan-subnets-using-static-arp-with-sonicos-enhanced/170503911164326/

Any help would be greatly appreciated! Thanks!
Avatar of David Sankovsky
David Sankovsky
Flag of Israel image

DMZ is not WAN, most firewalls will consider the DMZ interface as a LAN address, you'd need to first of all redirect all traffic from those computers to the world fia the dmz interface and then create a NAT rule over that

For starters, David's comment is correct.

Based on what you posted, the static routes method was correct. However, since you also want your systems to "show" as one of the IPs in the block, you also need to have a NAT policy that reflects what you want. (So for example, any traffic from interface X2 going to the internet should NAT to 2.3.4.5, and vice versa)

Also. consider the following, you have a range of external IPs. You can write a NAT rule so that any traffic from interface (Whatever) through the DMZ line should use a specific address OR you can make a more specific rule so that each computer has it's own "external" address.. Based on your needs of course.

Avatar of stinnett2000
stinnett2000

ASKER

Hi David, thank you for the suggestions. I am still confused and unable to get this to work. I don't understand what I would be NATting if the public IP is public already. I've got 60 public IPs in the CIDR block that I want to be able to use and assign to some workstations that need to appear as those public IPs. I was able to assign a single IP in the CIDR range to the DMZ port of the Sonicwall and then assigned a second CIDR IP to my laptop and was able to get outbound access to the internet however the IP I was seen was the WAN IP.  I am looking to have that setup but with the public IP as the IP that the internet sees.

I assigned the DMZ with IP ending in .65
I assigned the laptop with IP ending in .66
That seemed to work but the public IP seen was the WAN IP

I've added static ARP entries for each of the CIDR block of IP's.

I've added an Access Rule for Any from the DMZ to Any on the WAN

I'm confused as to what IP's I would use for a NAT policy? The CIDR block is already public and assigned to workstations in the DMZ zone.

Thank you again for your help. This is above my knowledge of programming the Sonicwall and I am lost.

When you assign the address of X.X.X.65 to your DMZ interface, you are basically telling your workstation to route ALL the packets to your SonicWall, that much I'm sure you understand.
The question is, how does your sonicwall decide to forward the traffic it receives.

When you receive a set  of addresses, you should also be told by the provider what is the default gateway on thier end, otherwise, your sonicwall can't route the information.. Based on the information you've given me I guess it .64 (check this BEFORE implementing any changes)

If that is the case, you need to tell your sonicwall to route all traffic received from that subnet (X.X.X.64/26) to X.X.X.64 (which according to logic would be some sort of router on your providers end)

The NAT would only be relevant if you gave computers internal addresses and the used the Firewall to let them out under a NAT (the routing rule would still apply however)


My CIDR info:

Subnet is x.x.x.64/26
Gateway is x.x.x.65
First Useable is x.x.x.66
Last Useable is x.x.x.126

Cox says that traffic should be going to .65

in that case, .65 is probably their address, change your interface address to .66, create a routing rule from the network to .65 and see how that works out for you

This question needs an answer!
Become an EE member today
7 DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform.
View membership options
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.