VPN: How to control / restrict traffic over a site to site VPN tunnel using Access Rules (SonicOS Enhanced)
This article illustrates how to restrict traffic to a particular IP Address and /or a Server over a site to site VPN tunnel. This way of controlling VPN traffic can be achieved by Access Rules.
For this scenario it is assumed that a site to site VPN tunnel between an NSA 2700 and a TZ 470 has been established and the tunnel up with traffic flowing both ways.
Now, all traffic from the the hosts behind the TZ 470 should be blocked except Terminal Services (RDP traffic to a Terminal Server behind the NSA 2700).
On the other hand, the hosts behind the NSA 2700 should be able to access everything behind the TZ 470 . The configuration of each firewall is the following:
Site A (NSA 2700/ NSA 2600 ) WAN (X1) IP: 1.1.1.1 LAN: 192.168.1.0/24 | Site B (TZ 470/ TZ 600) WAN (X1) IP: 2.2.2.2 LAN: 10.10.10.0/24 |
Terminal Server IP: 192.168.1.2 | Default gateway of hosts: 10.10.10.1 (X0 ip) |
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
How to Test:
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
How to Test:
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
How to Test: