SonicOS 8 Cloud Secure Edge Feature Guide
- Cloud Secure Edge
- Cloud Secure Edge Overview
- Activating Cloud Secure Edge in MySonicWall
- Configuring Cloud Secure Edge in SonicWall Firewall
- Configuring Access Control Rules on the CSE Console
- Deploying CSE App or Client and Testing Connectivity
- Viewing Cloud Secure Edge Connector Log events
- Use Case
- SonicWall Support
Configuring the Connector
This section explains how to configure the Connector in the SonicWall firewall.
To configure the Connector on firewall
-
Navigate to Network > Cloud Secure Edge > Access Settings page and click the Connectors tab.
You can see the Connector Synchronized with the SonicWall firewall and the enabled Connector status. If the Connector is not enabled by default, toggle the Enable option to enable it.
-
Select the Connector and click the Configure icon to edit the Private Classless Inter-Domain Routing (CIDRs) accessible over the solution.
The Connector shows the list of entries added to the CSE. There are two tabs for configuration: Private CIDRs and Domains.
-
You can add/remove/edit the CIDR entries. You are publishing the private applications/resources/networks that you want your end users to access.
-
You can also add/remove/edit the domains (optional).
Domains represent the private domains that are resolvable by this firewall using the Split DNS Feature. This list publish as domains resolvable by this firewall in the CSE Connector settings automatically.
CSE connector includes support for wildcard entries. This feature ensures that all sub-domains are properly accessible in terms of resource access.
- To enable DNS resolution for domains with all prefixes, configure the connector with a wildcard domain in the "Domain" section (e.g., *.sonicwall.local or *.sonicwall.com ).
- For resolving only specific domains, use non-wildcard domain entries in the "Domain" section of the connector configuration (e.g., a.sonicwall.local , b.sonicwall.com, or sonicwall.com).
w
-
-
Click the Configure icon to edit the Private CIDRs:
The maximum number of allowed private CIDRs is 32.
Add the Network resource in the Group under the Default CSE Allowed CIDRs and click Save.
-
Add the Network resource in the Group under the Default CSE Allowed CIDRs, and click Save.
Optional: Navigate to Object > Match Objects > Addresses > Address Objects. Click +Add to add the network resource in the Address Object Settings as below.
-
Optional: Navigate to Object > Match Objects > Addresses > Address Groups. There is only an edit group operation, and when clicked, it shows an Address Object group configuration. Search for Default CSE Allowed CIDRs" address group.
- User can edit Address Object group to add or delete address objects.
- User cannot delete an Address Object group.
- When expanded, this displays the member Address Objects.
-
In the Network > Cloud Secure Edge > Access Settings > Domains tab, click +Add option to add the Domains, it opens the Add Split DNS, and user can configure the split entries.
The maximum number of published DNS domains is 4.
- Lists all domain entries filtered for the WireGuard interface only.
- Allows adding or deleting domain entries.
- Search and refresh capabilities.
Was This Article Helpful?
Help us to improve our support portal