This article will show users how to configure a 'Route all Traffic' WAN GroupVPN Policy on a SonicWall UTM appliance. The result is that remote computers with SonicWall Global VPN Client (GVC) software connected to the policy will route all Internet traffic through its VPN connection to the UTM network. Once traffic from remote users' GVC computers to the UTM network is decrypted and encapsulated from the VPN, the original destinations of the traffic from the remote computer are honored and used for routing. Traffic from the GVC client destined for the Internet will be routed to the UTM device's WAN gateway router and traffic destined for the LAN and other internal networks will be routed as per the routing logic which applies to local hosts. Routing All Traffic through the SonicWall allows an administrator to protect a user by enforcing Intrusion Prevention, Gateway Anti-Virus, Anti-Spyware, Client Anti-Virus, Content Filtering, and other policies on remote users’ traffic.
The related configurations on the UTM appliance which has subscriptions for the various Security Services mentioned above are done in the Network | Zones screen. There are enforcement checkboxes for the various Security Services, and usually they are turned on the for the LAN and WAN zones. To accomplish the above mentioned protection of traffic coming across a 'Route all Traffic' WAN GroupVPN Policy, the administrator must enable the VPN zone enforcements for the Intrusion Prevention, Gateway Anti-Virus, Anti-Spyware, Client Anti-Virus, and / or Content Filtering services. The examples in this article use the default access rules which are created when enabling the WAN Group VPN. These default access rules allow all VPN Traffic to pass to the LAN and WAN.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Before You Begin
Configure Users
Configure Groups(not needed if using Local Users)
NOTE: For access to Local Network, you can add the local subnets under VPN Access List.
Configure WAN GroupVPN
Configure Internal DHCP Server(Not needed for External DHCP Server)
Configure DHCP over VPN for Internal Server(or Configure DHCP relay address for External Server)
OR
Configure NAT Policy
This NAT Policy is needed for many-to-one source IP address translation as remote VPN hosts go to the Internet via the VPN connection.
Enter Original Source: Any
Enter Translated Source: X1 IP
Enter Original Destination: Any
Enter Translated Destination:Original
Enter Original Service: Any
Enter Translated Service: Original
Enter Inbound Interface: X1 (note this is your WAN interface)
Enter Outbound Interface: X1
NOTE: In the Gen4 Pro products, and in NSA and NSA E-Class Products, the names of the network address objects are named after the interfaces. Thus the object named X1 IP will the correct choice for the Translated Source in those products, usually. Similar configurations can be done on other WANs, like X2, X3, etc. The TZ products instead use a friendlier name for the same network address object: WAN Primary IP. That object would be used as the Translated Source in those products. The TZ products also use friendlier names for the interfaces themselves. They are called LAN and WAN instead of X0 and X1. Thus the Inbound Interface and Outbound Interface would be set to WAN in those products, usually.
TIP:Routing All Traffic through the SonicWall allows an administrator to protect a user by enforcing Intrusion Prevention, Gateway Anti-Virus, Anti-Spyware, Client Anti-Virus, Content Filtering, and other policies on remote users’ traffic. On the UTM appliance which has subscriptions for the various Security Services mentioned above, the relevant configurations are done on the Object- Zones screen. There are enforcement checkboxes for the various Security Services, and usually they are turned on the for the LAN and WAN zones.
CAUTION: To protect traffic coming across a a 'Route all Traffic' WAN GroupVPN Policy, the administrator must edit the VPN zone and enable the checkboxes for the Intrusion Prevention, Gateway Anti-Virus, Anti-Spyware, Client Anti-Virus, and / or Content Filtering services.
Troubleshooting
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Before You Begin
Configure Users
Configure Groups(not needed if using Local Users)
NOTE: For access to Local Network, you can add the local subnets under VPN Access List.
Configure WAN GroupVPN
Configure Internal DHCP Server(Not needed for External DHCP Server)
Configure DHCP over VPN for Internal Server(or Configure DHCP relay address for External Server)
OR
Configure NAT Policy
This NAT Policy is needed for many-to-one source IP address translation as remote VPN hosts go to the Internet via the VPN connection.
Enter Original Source: Any
Enter Translated Source: X1 IP
Enter Original Destination: Any
Enter Translated Destination:Original
Enter Original Service: Any
Enter Translated Service: Original
Enter Inbound Interface: X1 (note this is your WAN interface)
Enter Outbound Interface: X1
NOTE: In the Gen4 Pro products, and in NSA and NSA E-Class Products, the names of the network address objects are named after the interfaces. Thus the object named X1 IP will the correct choice for the Translated Source in those products, usually. Similar configurations can be done on other WANs, like X2, X3, etc. The TZ products instead use a friendlier name for the same network address object: WAN Primary IP. That object would be used as the Translated Source in those products. The TZ products also use friendlier names for the interfaces themselves. They are called LAN and WAN instead of X0 and X1. Thus the Inbound Interface and Outbound Interface would be set to WAN in those products, usually.
TIP:Routing All Traffic through the SonicWall allows an administrator to protect a user by enforcing Intrusion Prevention, Gateway Anti-Virus, Anti-Spyware, Client Anti-Virus, Content Filtering, and other policies on remote users’ traffic. On the UTM appliance which has subscriptions for the various Security Services mentioned above, the relevant configurations are done on the Network - Zones screen. There are enforcement checkboxes for the various Security Services, and usually they are turned on the for the LAN and WAN zones.
CAUTION: To protect traffic coming across a a 'Route all Traffic' WAN GroupVPN Policy, the administrator must edit the VPN zone and enable the checkboxes for the Intrusion Prevention, Gateway Anti-Virus, Anti-Spyware, Client Anti-Virus, and / or Content Filtering services.
Troubleshooting