Scenario: discovering and managing SonicPoints at the remote site over an IPSEC site to site vpn tunnel which acts as default route for all traffic from the remote site. The Central site (internet gateway) provides DHCP services to the Sonicpoints and the clients at the remote site.
Please Note: The settings shown in this technote is just an example, you must substitute the settings as per your setup.
Deployment Steps:
Part 1: Configuration on the SonicWall UTM appliance(s)
Step 1: Create WLAN Tunnel Interface
Step 2: Create DHCP scopes on the central firewall with CAPWAP option (for ip-assignment to the Sonicpoints and clients at the remote site)
Step 3: Configure a site to site vpn policy on both the central and remote firewalls for routing all the internet traffic from remote site via the central site
Step 4: Configure the DHCP over VPN settings on both the central and remote firewalls to enable leasing of IPs from the central gateway
Part2: Configuration on the SonicPoint
Step 1: Downloading the SonicOS 5.9 compatible firmware for SonicPoint
Step 2: Accessing the SonicPoint Management Interface in Standalone Mode
Step 3: Uploading the SonicOS 5.9 compatible firmware for SonicPoint
Detailed configuration steps:
Part 1: Configuration on the SonicWall UTM appliance
Step 3: Configure a Site-to-Site VPN policy on both the central and remote firewalls for routing all the internet traffic from remote site via the central site
Central Gateway configuration (Site which provides internet access for the Sonicpoint subnet at the remote site)
a. Configure The VPN policy on the Central Gateway (as below)
b.Configure DHCP over VPN options on the Central Gateway
�
c. Configure a NAT policy to NAT the VPN DHCP Client's ips to the WAN interface ip (X1 ip)
Remote Gateway Configuration (Site where the Sonicpoints and the wireless clients are located)
a.Configure the VPN policy on the Remote Gateway
b.Configure the Interface (X2) to which the Sonicpoint would be connected to , with a static ip from the subnet that is defined� in Step 2(d)
c. Configure DHCP over VPN options on the Remote Gateway
Part 2: Configuration on the SonicPoints
Step 1: Downloading the SonicOS 5.9 compatible firmware for SonicPoint
Method 1: Connecting the SonicPoint to SonicWall UTM appliance running SonicOS 5.9 and above
When the SonicPoints are connected to a SonicWall UTM appliance s WLAN interface/Zone running SonicOS 5.9 and above, they will be automatically updated with the latest firmware.
Method 2: Manually updating the SonicPoint firmware
a. Download the TSR from a SonicWall UTM appliance running 5.9 or above
b. Open the TSR in a Text reader/editor and find the SonicPoint download URL
c. Copy-Paste the Download URL in a Web Browser and download the appropriate SonicPoint Image
Step 2: Accessing the SonicPoint Management Interface in Standalone Mode:
Troubleshooting Tip:If you are unable to access the SonicPoint, you may press the Reset Button to access it in SafeMode and then follow the above steps again:
Step 3: Uploading the SonicOS 5.9 compatible firmware for SonicPoint
Please Note: During the reboot the SonicPoint will initiate the DHCP Process (DORA) and the Remote Gateway should perform DHCP Relay to Central Gateway for SonicPoint to successfully get the DHCP IP with DHCP Option 138. Then SonicPoint will initiate CAPWAP and GRE/DTLS process to IP received via DHCP option 138 to complete the SonicPoint provisioning.
How to Test
Go to SonicPoint | Status page, you must see the remote SonicPoint with label MGMT: Layer 3.