Overview / Scenario:
Before continuing to connect the SonicWall SSL-VPN appliance to your network, refer the diagrams on the "SonicWall Recommended Deployment Scenario" in KBID 6122 to determine the proper scenario for your network configuration.
Deployment Steps:
Step 1: Connecting the SonicWall SSL-VPN appliance
Step 2: Connecting to the SonicWall UTM Appliance
Step 3: Allowing SSL-VPN -> LAN Connection in SonicOS Enhanced
Step 4:Setting Public Server Access in SonicOS Enhanced
Step 5: Testing Your SSL-VPN Connection
Procedure:
Step 1: Connecting the SonicWall SSL-VPN appliance
1. Connect one end of an Ethernet cable to the OPT, X2, or other unused port on your existing SonicWall UTM appliance.
2. Connect the other end of the Ethernet cable to the X0 port on the front of your SonicWall SSL-VPN 2000. The X0 Port LED lights up green indicating an active connection.
Now that you have set up your SonicWall SSL-VPN appliance (for example: SSL-VPN 2000), you need to configure your gateway device (SonicWall Firewall appliance) to work with the SonicWall SSL-VPN appliance.
Step 2: Connecting to the SonicWall UTM Appliance
|
Name
|
Enter a name for the SonicWall SSL-VPN appliance
|
|
Zone Assignment
|
SSLVPN
|
|
Type
|
Host
|
|
IP Address
|
The SonicWall SSL-VPN appliance's X0 IP address,
192.168.200.1 by default
|
|
Name
|
Enter a name for NetExtender
|
|
Zone Assignment
|
SSLVPN
|
|
Type
|
Range
|
|
Starting IP Address
|
The start of the NetExtender IP address range,
192.168.200.100 by default
|
|
Ending IP Address
|
The end of the NetExtender IP address range,
192.168.200.200 by default
|
6. On the Network > Address Objects page, in the Address Groups section, click ADD Group button.
7. In the Add Address Object Group dialog box, create a group for the X0 interface IP address of your SonicWall SSL-VPN appliance and the NetExtender IP range:
11. In the Add Rule window, create a rule to allow access to the LAN for the address group you just created:
|
Action
|
Allow
|
|
From Zone
|
SSLVPN
|
|
To Zone
|
LAN
|
|
Service
|
Any
|
|
Source
|
The address group you just created, such as
SonicWall_SSLVPN_Group
|
|
Destination
|
Any
|
|
Users Allowed
|
All
|
|
Schedule
|
Always on
|
|
Enable Logging
|
Selected
|
|
Allow Fragmented Packets
|
Selected
|
Click OK to create the rule.
Step 4: Setting Public Server Access in SonicOS Enhanced???
8. Enter a comment, such as WAN to SSL-VPN" to describe your connection.
9. Click the Next button to continue the Wizard.
10. Verify that the Public Server field contains the correct IP address (You can generally leave this at the default setting).
11. Click the Next button.
12. Click the Apply button.
Step 5: Testing Your SSL-VPN Connection
Now you have configured your SonicWall UTM appliance and SonicWall SSLVPN appliance for secure SSL VPN remote access. This section provides instructions to verify your SSL-VPN connection using a remote client on the WAN.

Congratulations! You have successfully set up your SonicWall SSL-VPN appliance.
Source: SSL VPN: SonicWall SSL VPN 2000 Getting Started Guide