VPN: How to restrict traffic over a site to site VPN tunnel using NAT over VPN(SonicOS Enhanc

Description

VPN: How to restrict traffic over a site to site VPN tunnel using NAT over VPN(SonicOS Enhanced)

Resolution

Feature/Application:

This article illustrates how to restric traffic over a site to site VPN tunnel using the Apply NAT Policies feature  in SonicWall VPN GUI.

Image

For this scenario it is assumed that a site to site VPN tunnel between an NSA 2400 and an NSA 240 needs to established. However, the hosts behind the NSA 240 should be able to access only the Terminal Server behind the NSA 2400.  On the other hand, the hosts behind the NSA 2400 should be able to access everything behind the NSA 240. The configuration of each firewall is the following:

 

Site A (NSA 2400)
WAN (X1) IP: 1.1.1.1
LAN  (X0) IP: 192.168.1.0/24
Site B (NSA 240)
WAN (X1) IP: 2.2.2.2
LAN  (X0) IP: 10.10.10.0/24

Terminal Server IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1 
(X0 IP)

Default gateway of hosts
10.10.10.1 (X0 IP)


Procedure:

Site A (NSA 2400) configuration:

Step  1. Login to the SonicWall Management Interface
Step  2. Navigate to the Network > Address Objects page.
Step  3. Create a new Address Object named "Remote Site LAN" with details as per the screenshot:

Image

Step  4. Create a new Address Object named "Terminal Server" with details as per the screenshot:

Image

Step  5. Navigate to the VPN > Settings page.
Step  6. Create a VPN policy with details as per the following screenshots. 

Image

Step  7. Click OK to save.
Step  8. Navigate to the Network > NAT Policies page.
Step  9. Select the Custom Policies radio button.
Step  10.Edit the automatically created NAT Policy and change the Translated Destination to "Original".

Image
Site B (NSA 240) configuration:

Step  1. Login to the SonicWall Management Interface
Step  2. Navigate to the Network > Address Objects page.
Step  3. Create a new Address Object named "Remote Site Terminal Server" with details as per the screenshot:
Image

Step  4. Click OK to save.
Step  5. Navigate to the VPN > Settings page.
Step  6. Create a VPN policy with details as per the following screenshots.

Image

Step  7. Click OK to save.

The Tunnel have to be activated by initiating a ping from a host behind the NSA 240 to the Terminal Server IP 192.168.1.2.


How to Test:

  • Test by pinging other hosts behind the NSA 2400 and it should fail.
  • Likewise, hosts behind the NSA 2400 will be able to ping all hosts behind the NSA 240.

 

Related Articles

  • How to block ICMP (Ping ) using Application control
    Read More
  • SonicWall GEN8 TZ and NSa Firewalls FAQ
    Read More
  • How to configure Link Aggregation
    Read More
not finding your answers?