Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How to configure Firewall to route all traffic from L2TP VPN client to the remote site via MPLS VPN

10/14/2021 14 People found this article helpful 204,930 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    How to configure Firewall to route all traffic from L2TP VPN client to the remote site via MPLS VPN tunnel.

    Resolution



    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.


    In the below scenario, outside laptop connects to Site A through L2TP VPN. Both Site A and Site B can access to Internet via WAN interface X1, while  there is an MPLS VPN tunnel between these two sites. This article will describe how to route all traffic from terminal laptop to the remote Site B through MPLS VPN tunnel.
     Image

    How to configure:

    Go to Manage > VPN > L2TP Server

    Select Enable L2TP Server and click Configure as shown below:

    Image


    Kepp alive should be set for 60 Secs.
    Configure the Primary and Secondary DNS Server with the ip addresses of your internal DNS Servers.
    Example:

    - DNS Server 1: 10.190.202.200
    - DNS Server 2: 10.102.1.51

      Image
    Step 1: Configure L2TP Server on the firewall of Site A.
      Please refer to the KB 5378: Configuring L2TP Server on SonicOS Enhanced

    Go to Manage > VPN > L2TP Server > L2TP Users
     
    Image



     
    Step 2: Route all traffic of terminal laptop to Site A.
     
    • Navigate to Manage | Users | LocalUsers & Groups,  Click the Edit button of L2TP VPN user (If non existant please create a user)
      Image


    • Add group Trusted Users (Configured for L2TP) in the Groups tab.

    Image
    • Add WAN RemoteAccess Networks in the VPN Access tab.
    Image

    • Navigate to Manage | VPN | Base Settings page 
    • Enable WAN Group VPN | Click the Edit button of  WAN GroupVPN
      Image
    • Select This Gateway Only for option Allow Connections to: at Client tab | Tick options Set Default Route as this Gateway and also Apply VPN Access Control List.
    Image 
     
    Step 3 : Route all traffic of terminal laptop from Site A to Site B.
     
    • Add a routing policy on the firewall of Site A. Go to Manage| Network | Routing | Routing Policies | Click button Add.
    • Source: L2TP IP Pool
    • Destination: Any
    • Service: Any
    • Gateway: To SiteB Gateway
    • Interface: Select interface connected to MPLS Tunnel
    • Metric: 1
    Image 


    • On site A, add a NAT policy to translate L2TP IP Pool addresses to the IP address visible on Site B (you can choose IP address of the interface connecting to MPLS tunnel ).
    • Navigate to Manage | Rules | NAT Policies | Click button Add.


    Image

    Image 

    Note: when browse NAT policies you will find there is a default NAT policy for  L2TP IP Pool which was generated by system when configuring WAN GroupVPN.  In order to ensure the policy you just created can be hit as default, y ou are required to change the Priority of the NAT policy you just added to be prior to the default NAT Policy by clicking Priority button. In this case,  the priority for the policy is configured as 3.

     
    Step 4 : this step depends on the zone type of the interface connecting to MPLS VPN tunnel. If  the type of the interface is LAN, you can ignore this step. If the interface is set as DMZ or WAN, you are required to add Access Rules (Manage | Rules | Access Rules ) on Site B for WAN/DMZ to LAN and WAN to WAN access. While, when using WAN zone, you may also need to add a NAT policy to translate the IP address of MPLS VPN to the WAN primary IP address on site B.

    How to test:
    • On the mobile laptop, connect to the L2TP server of site A and ping any LAN subnet IP address of site B or Interet site.

    • You can capture the packets on Site B to check whether the traffic has been routed.


    �

    Resolution for SonicOS 6.2 and Below

    The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.


    In the below scenario, outside laptop connects to Site A through L2TP VPN. Both Site A and Site B can access to Internet via WAN interface X1, while  there is an MPLS VPN tunnel between these two sites. This article will describe how to route all traffic from terminal laptop to the remote Site B through MPLS VPN tunnel.
     Image

    How to configure:
    Image
    Step 1: Configure L2TP Server on the firewall (TZ205) of Site A.
      Please refer to the KB 5378: Configuring L2TP Server on SonicOS Enhanced

     
    Image



     
    Step 2: Route all traffic of terminal laptop to Site A.
     
    • Navigate to Users | LocalUsers | Click the Edit button of L2TP VPN user | Add group Trusted Users (Configured for L2TP) in the Groups tab | Add WAN RemoteAccess Networks in the VPN Access tab.

    ImageImage

    • Navigate to VPN | Settings page | Enable WAN Group VPN | Click the Edit button of  WAN GroupVPN | Select This Gateway Only for option Allow Connections to: at Client tab | Tick options Set Default Route as this Gateway and also Apply VPN Access Control List.
    Image
     
    Step 3 : Route all traffic of terminal laptop from Site A to Site B.


     
    • Add a routing policy on the firewall of Site A. Go to Network | Routing | Click button Add.
    Image
    • On site A, add a NAT policy to translate L2TP IP Pool addresses to the IP address visible on Site B (you can choose IP address of the interface connecting to MPLS tunnel ). Navigate to Network | NAT Policies | Click button Add.
    Image

    Note: when browse NAT policies you will find there is a default NAT policy for  L2TP IP Pool which was generated by system when configuring WAN GroupVPN.  In order to ensure the policy you just created can be hit as default, y ou are required to change the Priority of the NAT policy you just added to be prior to the default NAT Policy by clicking Priority button. In this case,  the priority for the policy is configured as 3.


     
    Step 4 : this step depends on the zone type of the interface connecting to MPLS VPN tunnel. If  the type of the interface is LAN, you can ignore this step. If the interface is set as DMZ or WAN, you are required to add Access Rules (Firewall | Access Rules ) on Site B for WAN/DMZ to LAN and WAN to WAN access. While, when using WAN zone, you may also need to add a NAT policy to translate the IP address of MPLS VPN to the WAN primary IP address on site B.

    How to test:
    • On the mobile laptop, connect to the L2TP server of site A and ping any LAN subnet IP address of site B or Interet site.

    • You can capture the packets on Site B to check whether the traffic has been routed.

    Related Articles

    • Bandwidth usage and tracking in SonicWall
    • How to force an update of the Security Services Signatures from the Firewall GUI
    • Configure Guest VLAN in the TZ firewall, for guest users to access Internet only.

    Categories

    • Firewalls > TZ Series
    • Firewalls > SonicWall SuperMassive E10000 Series
    • Firewalls > SonicWall SuperMassive 9000 Series
    • Firewalls > SonicWall NSA Series

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2023 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top