This article explains how to allow SSLVPN user to access the remote network across site to site VPN.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
NOTE: Now when that user will try to access any computer with 1.1.1.x network he will be able to access that.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
NOTE: Now when that user will try to access any computer with 1.1.1.x network he will be able to access that.
If it is not possible to change the Site to Site VPN Tunnel
If it is not possible to modify the currently active VPN Site to Site tunnel it is always possible to perform a NAT of the SSLVPN range.
Configure the SSLVPN like the examples above and add a NAT policy.
In the example above:
SSL Scope is the SSLVPN Address Range configured in SSLVPN Client Settings
Translated Source is the NAT applied to the incoming packets translated with X0 IP (in a scenario in which the X0 Subnet is the subnet already active in the Site to Site tunnel)
Original Destination is the remote VPN Subnet
Keep in mind that the NAT solution will works only when the traffic is originated from SSL VPN Client to the remote network.
It is not possible to originate the traffic from Chicago LAN due to the routing of the firewall.