Secure Access Advanced Settings

Site-to-Site Interconnectivity

This article describes how to ensure that two sites are connected securely using the SonicWall Platform.

If the two sites are both tunneled to your SonicWall network, you can enable the two to communicate, regardless of their location or dependency so that both sites will have a full and secure line between them.

Please follow the steps below:

IPSec based connections

  1. Ensure both tunnels are route-based tunnels; that is, they do not depend on a specific internal subnet to create a handshake between the sites, but a route is configured on each device’s separate Route Table indicating which subnets to forward into the tunnel.
  2. On the Management Platform, set both tunnel’s “Gateway Proposal Subnets” and “Remote gateway Proposal Subnets” to ANY (0.0.0.0/0).

    This may make the tunnel go down! Please make sure the device you are using supports route-based VPN. This means the tunnel is set up to 0.0.0.0/0 and a route is added separately.

  3. Make sure the Routes Table on the SonicWall side has all of the routes of all of the sites configured (Network/ Route Tables) so in case you had them defined within the tunnel module, instead you need to add them here.

  4. Click Add Route and add the routing to the internal LAN subnets that are behind each tunnel.

  5. After you are done, click Apply Configuration.

  6. Go to the first site's (labeled Site1) routing table, and in addition to the route that indicates all subnets (usually 10.255.0.0/16) to go through the Site to site tunnel, add a route dictating all traffic that goes to the second site's LAN subnet as well.
  7. Go to the second site's (labeled Site2) routing table, and set up a static route indicating both the LAN subnet and Site1’s LAN subnet to go through the IPSEC Site-2-Site tunnel.

WireGuard based connections

  1. In order to establish a connection from one resource to another, you'll need to reinstall the connector, as the default installation (Accessor mode) does not allow it.

    Uninstall Commands

    • Ubuntu

      # Locate the WireGuard packages (the output of this command is the full package name)
      dpkg -l | grep wireguard
      # Delete all packages found that are associated with WireGuard (replace pkg with the output from the previous command)
      apt-get remove --purge pkg
    • CentOS

      # Locate the WireGuard packages (the output of this command is the full package name)
      yum list installed | grep wireguard
      # Delete all packages found that are associated with WireGuard (replace pkg with the output from the previous command)
      yum remove pkg
  2. Once you successfully removed the files mentioned in the commands above, reboot the machine and execute the connector installation script (the curl command that you copied from the Management Platform).
  3. When you reach the 4th step, choose NO (n), which will prevent accessor mode installation.
  4. Proceed with the installation. Make sure to select YES (y) for both IP Forwarding and Routing all traffic.
  5. Open the route table of the network in which the WireGuard connector is installed (usually your router or firewall).
  6. Configure a static route dictating all traffic from your SonicWall LAN subnet (10.XXX.0.0/16) to go through the IP of the machine that hosts the connector.
  7. Open the terminal of the machine that hosts the connector and execute the following command:

    Shell

    # Temporarily shut the connector down
    wg-quick down wg0
    # Open the connector's route table.
    vi /etc/wireguard/wg0.conf
    # Enter the subnets of the resources you'd like to communicate with each other
    set AllowedIPs = <SonicWall Subnet>, <Site1 Subnet>,< Site 2 Subnet>
    # Turn the connector up
    wg-quick up wg0
    # Make sure that the desired change has taken place
    wg show

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden