There are multiple methods to restrict remote VPN users' access to network resources. This article list three, namely:
When a user is created, the user automatically becomes a member of Trusted Users and Everyone under the Users | Local Groups page. If you click on the configure tab for any one of the groups and if LAN Subnets is selected, every user can access any resource on the LAN. Following are the steps to restrict access based on user accounts.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Adding Address Objects:
For more information on creating Address Objects, refer Understanding Address Objects in SonicOS
Adding and Configuring User Groups:
Adding users to appropriate Groups:
Restrict access to a specific service (e.g. Terminal Services) using Access Rules:
How to Test:
Test by trying to ping an IP Address on the LAN from a remote GVC PC. Since we have selected Terminal Services ping should fail. Try to do Remote Desktop Connection to the same host and you should be able to.
Restrict access to a specific host behind the SonicWall using Access Rules:
In this scenario, remote VPN users' access should be locked down to one host in the network, namely a Terminal Server on the LAN. It is assumed that WAN GroupVPN, DHCP over VPN and user access list has already configured.
Creating an address object for the Terminal Server
Creating access rules to block all traffic to the network and allow traffic to the Terminal Server.
NOTE: If you have other zones like DMZ, create similar deny rules From VPN to DMZ.
How to Test:
Test by trying to ping an IP address on the LAN or DMZ from a remote GVC PC. Since we have created a deny rule to block all traffic to LAN or DMZ from remote GVC users, the ping should fail. Try to do a ping or Remote Desktop Connection to the Terminal Server on the LAN and you should be able to.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Restrict access to hosts behind SonicWall based on Users:
Adding Address Objects:
For more information on creating Address Objects, refer Understanding Address Objects in SonicOS
Adding and Configuring User Groups:
Adding users to appropriate Groups:
Restrict access to a specific service (e.g. Terminal Services) using Access Rules:
NOTE: If you have other zones like DMZ, create similar rules From VPN to DMZ.
How to Test:
Test by trying to ping an IP Address on the LAN from a remote GVC PC. Since we have selected Terminal Services ping should fail. Try to do Remote Desktop Connection to the same host and you should be able to.
Restrict access to a specific host behind the SonicWall using Access Rules:
In this scenario, remote VPN users' access should be locked down to one host in the network, namely a Terminal Server on the LAN. It is assumed that WAN GroupVPN, DHCP over VPN and user access list has already configured.
Creating an address object for the Terminal Server
Creating access rules to block all traffic to the network and allow traffic to the Terminal Server.
NOTE: If you have other zones like DMZ, create similar deny rules From VPN to DMZ.
How to Test:
Test by trying to ping an IP address on the LAN or DMZ from a remote GVC PC. Since we have created a deny rule to block all traffic to LAN or DMZ from remote GVC users, the ping should fail. Try to do a ping or Remote Desktop Connection to the Terminal Server on the LAN and you should be able to.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Restrict access to hosts behind SonicWall based on Users:
Adding Address Objects:
For more information on creating Address Objects, refer Understanding Address Objects in SonicOS
Adding and Configuring User Groups:
Adding users to appropriate Groups:
Restrict access to a specific service (e.g. Terminal Services) using Access Rules:
How to Test:
Test by trying to ping an IP Address on the LAN from a remote GVC PC. Since we have selected Terminal Services ping should fail. Try to do Remote Desktop Connection to the same host and you should be able to.
Restrict access to a specific host behind the SonicWall using Access Rules:
In this scenario, remote VPN users' access should be locked down to one host in the network, namely a Terminal Server on the LAN. It is assumed that WAN GroupVPN, DHCP over VPN and user access list has already configured.
Creating an address object for the Terminal Server
Creating access rules to block all traffic to the network and allow traffic to the Terminal Server.
NOTE: If you have other zones like DMZ, create similar deny rules From VPN to DMZ.
How to Test:
Test by trying to ping an IP address on the LAN or DMZ from a remote GVC PC. Since we have created a deny rule to block all traffic to LAN or DMZ from remote GVC users, the ping should fail. Try to do a ping or Remote Desktop Connection to the Terminal Server on the LAN and you should be able to.