How to Restrict VPN Access to SSL VPN Client Based on User, Service & Destination
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
1) Restrict Access to Network behind SonicWall based on Users
While Configuring SSLVPN in SonicWall, the important step is to create a User and add them to SSLVPN service group. So the Users who is not a member of SSLVPN Services Group cannot be able to connect using SSLVPN. You have option to define access to that users for local network in VPN access Tab.
When a user is created, the user automatically becomes a member of Trusted Users and Everyone under the Device| Users | Local Users & Groups | Local Groups page. To use that User for SSLVPN Service, you need to make them as member of SSLVPN Services Group.
2) Restrict Access to Services (Example: Terminal Service) using Access rule
Create the following access rules.
Note: If you have other zones like DMZ, create similar rules From SSLVPN to DMZ.
3) Restrict Access to Destination host behind SonicWall using Access Rule
In this scenario, SSLVPN users' access should be locked down to one host in the network, namely a Terminal Server on the LAN. It is assumed that SSLVPN service, User access list has already configured and further configuration involves:
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
1) Restrict Access to Network behind SonicWall based on Users
While Configuring SSLVPN in SonicWall, the important step is to create a User and add them to SSLVPN service group. So the Users who is not a member of SSLVPN Services Group cannot be able to connect using SSLVPN. You have option to define access to that users for local network in VPN access Tab.
When a user is created, the user automatically becomes a member of Trusted Users and Everyone under the Manage | Users | Local Users & Groups | Local Groups page. To use that User for SSLVPN Service, you need to make them as member of SSLVPN Services Group.
If you click on the configure tab for any one of the groups and if LAN Subnet is selected in VPN Access Tab, every user of that group can access any resource on the LAN. Following are the steps to restrict access based on user accounts.
Adding Address Objects:
Login to your SonicWall Management page
Click Manage in the top navigation menu.
Navigate to Objects | Address Objects, under Address objects click Add to create an address object for the computer or computers to be accessed by Restricted Access group as below.
Adding and Configuring User Groups:
1) Login to your SonicWall Management Page
2) Navigate to Manage | Users | Local Users & Groups | Local Groups, Click the configure button of SSLVPN Services. Click the VPN Access tab and remove all Address Objects from the Access List.
3) Navigate to Users | Local Users & Groups | Local Groups, Click Add to create two custom user groups such as "Full Access" and "Restricted Access". Also make them as member of SSLVPN Services Group.
2) Restrict Access to Services (Example: Terminal Service) using Access rule
Login to your SonicWall Management page
Create the following access rules.
Note: If you have other zones like DMZ, create similar rules From SSLVPN to DMZ.
3) Restrict Access to Destination host behind SonicWall using Access Rule
In this scenario, SSLVPN users' access should be locked down to one host in the network, namely a Terminal Server on the LAN. It is assumed that SSLVPN service, User access list has already configured and further configuration involves:
|| Creating an address object for the Terminal Server
|| Create 2 access rule from SSLVPN to LAN zone
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
1) Restrict Access to Network behind SonicWall based on Users
While Configuring SSLVPN in SonicWall, the important step is to create a User and add them to SSLVPN service group. So the Users who is not a member of SSLVPN Services Group cannot be able to connect using SSLVPN. You have option to define access to that users for local network in VPN access Tab.
When a user is created, the user automatically becomes a member of Trusted Users and Everyone under the Users | Local Groups page. To use that User for SSLVPN Service, you need to make them as member of SSLVPN Services Group.
If you click on the configure tab for any one of the groups and if LAN Subnet is selected in VPN Access Tab, every user of that group can access any resource on the LAN. Following are the steps to restrict access based on user accounts.
Adding Address Objects:
Login to your SonicWall Management page
Navigate to Network | Address objects, under Address objects click Add to create an address object for the computer or computers to be accessed by Restricted Access group as below.?
Adding and Configuring�User Groups:
1) Login to your SonicWall Management Page
2) Navigate to Users | Local Groups, Click the Configure button of SSLVPN Service Group. Click the VPN Access tab and remove all Address Objects from the Access List.
3) Navigate to Users | Local Groups | Add Group, create two custom user groups such as "Full Access and Restricted Access". Also make them as member of SSLVPN Services Group.
2) Restrict Access to Services (Example: Terminal Service) using Access rule
Login to your SonicWall Management page
Create the following access rules.
Note: If you have other zones like DMZ, create similar rules From SSLVPN to DMZ.
3) Restrict Access to Destination host behind SonicWall using Access Rule
In this scenario, SSLVPN users' access should be locked down to one host in the network, namely a Terminal Server on the LAN. It is assumed that SSLVPN service, User access list has already configured and further configuration involves:
|| Creating an address object for the Terminal Server
|| Create 2 access rule from SSLVPN | LAN zone