SSL VPN is one method of allowing Remote Users to connect to the SonicWall and access internal network resources. SSL VPN Connections can be setup with one of three methods:
- The SonicWall NetExtender Client
- The SonicWall Mobile Connect Client
- SSL VPN Bookmarks via the SonicWall Virtual Office
This article details how to setup the SSL VPN Feature for NetExtender and Mobile Connect Users, both of which are software based solutions. If you would like information on configuring Virtual Office please reference Configuring Virtual Office.
NetExtender is available for the following Operating Systems:
- Microsoft Windows
- Linux Distributions
Mobile Connect is available for the following Operating Systems:
- Windows 8.1 & 10
- OS X
Don’t want to read? Watch instead!
Creating an Address Object for the SSLVPN IPv4 Address Range
- Login to the SonicWall Management GUI.
- Click Manage in the top navigation menu
- Navigate to Objects | Address Objects and click +Add at the top of the pane.
3. In the pop-up window, enter the information for your SSL VPN Range. An example Range is included below:
- Name: SSL VPN Pool TIP: This is only a Friendly Name used for Administration.
- Zone: SSLVPN
- Type: Range NOTE: This does not have to be a range and can be configured as a Host or Network as well
- Starting IP Address: 192.168.168.100
- Ending IP Address: 192.168.168.110
1. Navigate to the SSL-VPN | Server Settings page.
2. Click on the Red Bubble for WAN, it should become Green. This indicates that SSL VPN Connections will be allowed on the WAN Zone.
3. Set the SSL VPN Port, and Domain as desired.
NOTE: The SSLVPN port will be needed when connecting using Mobile Connect and NetExtender unless the port number is 443. Port 443 can only be used if the management port of the firewall is not 443.
NOTE: The Domain is used during the user login process’
TIP: If you want to be able to manage the firewall via GUI or SSH over SSLVPN these features can be enabled separately here as well.
4. Navigate to the SSL VPN | Client Settings page.
The SSL VPN | Client Settings page allows the administrator to configure the client address range information and NetExtender client settings, the most important being where the SSL-VPN will terminate (e.g. on the LAN in this case) and which IPs will be given to connecting clients.
CAUTION: NetExtender cannot be terminated on an Interface that is paired to another Interface using Layer 2 Bridge Mode. This includes Interfaces bridged with a WLAN Interface. Interfaces that are configured with Layer 2 Bridge Mode are not listed in the “SSLVPN Client Address Range” Interface drop-down menu. For NetExtender termination, an Interface should be configured as a LAN, DMZ, WLAN, or a custom Trusted, Public, or Wireless zone, and also configured with the IP Assignment of “Static”.
5. Click on the Configure button for the Default Device Profile.
5. Set the Zone IP V4 as SSLVPN. Set Network Address IP V4 as the Address Object you created earlier (SSLVPN Range).
6. The Client Routes tab allows the Administrator to control what network access SSL VPN Users are allowed. The NetExtender client routes are passed to all NetExtender clients and are used to govern which networks and resources remote users can access via the SSL VPN connection.
CAUTION: All SSL VPN Users can see these routes but without appropriate VPN Access on their User or Group they will not be able to access everything shown in the routes. Please make sure to set VPN Access appropriately.
7. The Client Settings tab allows the Administrator to input DNS, WINS, and Suffix information while also controlling the caching of passwords, user names, and the behavior of the NetExtender Client.
8. Input the necessary DNS/WINS information and a DNS Suffix if SSL VPN Users need to find Domain resources by name.
9. Enable Create Client Connection Profile – The NetExtender client will create a connection profile recording the SSL VPN Server name, the Domain name and optionally the username and password.
Adding Users to SSLVPN Services Group
NetExtender Users may either authenticate as a Local User on the SonicWall or as a member of an appropriate Group through LDAP. This article will cover setting up Local Users, however if you’re interested in using LDAP please reference How to Configure LDAP Authentication for SSL-VPN Users.
1. Navigate to Users | Local Users & Groups. Add a new User if necessary by using the + Add button.
2. On the Groupstab add SSLVPN Services to the Member Of: field.
3. On the VPN Access tab add the relevant Subnets, Range, or IP Address Address Objects that match what the User needs access to via NetExtender.
CAUTION: SSL VPN Users will only be able to access resources that match both their VPN Access and Client Routes.
4. Click OK to save these settings and close the window.
Checking Access rule Information for SSLVPN Zone
1. Navigate to Rules | Access Rules.
2. Access the SSLVPN to LAN rules via the Zone drop-down options or the highlighted matrix button below.
3. You will need to create Access Rules similar to the image below allowing SSLVPN IPs to access your intended end devices.
NOTE: This does not grant access to all users, individual access is still granted to users based on their VPN access and SSLVPN routes. Access rules are needed for the firewall to allow this traffic through.
4. If SSL VPN Users need access to resources on other Zones, such as the DMZ or a Custom Zone, verify or add those Access Rules. If you’re unsure how to create an Access Rule please reference How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall.
Testing the Connection
1. Download and install either SonicWall NetExtender or SonicWall Mobile Connect. NetExtender is available via MySonicWall.com or the Virtual Office page on the SonicWall. SonicWall Mobile Connect is available via the App Store, Windows Store, or Apple Store depending on your Operating System.
2. If using NetExtender, input the following:
- IP Address or URL of the SonicWall WAN Interface, followed by the Port Number EXAMPLE: https://www.sslvpnurlgoeshere.com:4433
- User Name
3. If using Mobile Connect, input the following:
- Connection Name TIP: This is a friendly name for your device
- IP Address or URL of the SonicWall WAN Interface, followed by the Port Number
NOTE: Mobile Connect will prompt for User and Password after it’s able to verify a connection to the SonicWall. This is slightly different than NetExtender. If you are logging on via desktop, you may need to reference your domain in the user field via the user@domain format
4. The connection should establish and the User should be able to access the appropriate resources.
TIP: Ping is a great tool to test access to resources once the VPN Connection has established. If Pings are Timing Out it’s advisable to perform a Packet Monitor on the SonicWall to determine what is happening to the traffic. Keep in mind, pings to the SonicWall are considered management traffic and require specific access rules to allow this traffic.