This configuration allows you to control the behavior of a single WAN GroupVPN policy to behave differently for different users or user groups. Using one policy, you can have some users on a route all traffic policy and other users on a Split Tunnel (see definition below) policy. The different policy types are based on the Users or User Groups VPN Access settings, and are not based on global settings in the WAN GroupVPN policy configuration.
The term Split Tunnel in the world of VPN means a policy in which the VPN provides access to logically-defined protected networks behind a VPN Gateway device, such as a SonicWall UTM firewall, while all other traffic towards the Internet is unchanged and goes out the local Internet gateway. A route all VPN policy would take all traffic from the remote user and terminate it on the target network, where it is unpacked and inspected for the original desired destination IP addresses. For destinations which are inside the target network, they are sent directly, and for destinations toward the Internet, they are subject to NAT and then sent out the target network's WAN so that it appears to originate there, not from the remote user's part of the Internet.
NOTE: in SonicOS 5.6 and beyond, the VPN Access configurations used in this technique also dictate the networks to which UTM SSLVPN remote users have access. This is important to know. Any user who is given the properties needed for GVC route all policy will also have settings appropriate for tunnel all NetExtender connections. NetExtender in split tunnel mode will work properly, and so will tunnel all mode if that checkbox is enabled on the SSLVPN | Client Routes screen.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.






NOTE: No custom access rules are needed, under Rules|Access Rules SonicOS automatically creates a rule allowing traffic from VPN to WAN for you.

This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.




NOTE: No custom access rules are needed, under Rules|Access Rules SonicOS automatically creates a rule allowing traffic from VPN to WAN for you.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.





NOTE: For some models, the names of the correct network address objects or interfaces may be different, such as this variation you would see on a TZ170 running SonicOS Enhanced.

NOTE: No custom access rules are needed, since SonicOS automatically creates a rule allowing traffic from VPN to WAN for you.