Secure Mobile Access 100 10.2 Deployment Planning Guide
Allowing DMZ to LAN Connection
When users have connected to the SMA, they need to be able to connect to resources on the LAN.
To allow a DMZ to LAN connection
- Using SonicOS, navigate to the OBJECT | Match Objects > Addresses page on the gateway appliance.
- In the Address Objects tab, click +Add.
-
In the Address Object Settings dialog box, create an address object for the X0 interface IP address of your SMA appliance:
Name Name of the SMA appliance Zone Assignment DMZ Type Host IP Address X0 IP address of the SMA appliance within your DMZ range, such as 10.1.1.10. - Click OK to create the object. Once added, click Close.
- Click +Add again to create an address object for the NetExtender range.
-
In the Add Object dialog box, create an address object for the NetExtender range using the following options, then click Add:
Name Name for NetExtender Zone Assignment DMZ Type Range Starting IP address Start of the NetExtender IP address range within your DMZ range, such as 10.1.1.220
.Ending IP address End of the NetExtender IP address range within your DMZ range, for example 10.1.1.249
.
- On the OBJECT | Match Objects > Addresses page, click the Address Groups tab.
- Click +Add.
-
In the Add Address Groups dialog box, create a group for the X0 interface IP address of your SMA appliance and the NetExtender IP range:
- Enter a name for the group.
- In the left column, select the address objects you created and click the right arrow button.
-
Click Save to create the group when both objects are in the right column.
- Navigate to the POLICY | Rules and Policies > Access Rules page, and select the Matrix view style.
-
Click the DMZ > LAN icon.
- On the page that displays for SMA to LAN, click +Add.
-
In the Add Rule window, create a rule to allow access to the LAN for the address group you just created:
Source Zone/Interface SMA Source Destination LAN Source Port Any Service Any Source The address group you just created, such as SMA and NetExtender. Destination Any Users Allowed All Users Excluded None Schedule Always on Select the following check box(es) - Enable Logging
- Allow Fragmented Packets
- Click OK to create the rule.
This completes Scenario B.
Some gateway appliances have a default zone named SSLVPN. Do not select this zone when configuring for the SMA appliance. The SSLVPN zone is intended for use with the more limited SSLVPN features that are included in the firewall products.
Continue to Additional Configuration and Testing and Troubleshooting Your Remote Connection.
Was This Article Helpful?
Help us to improve our support portal