Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

VPN: Port Forwarding over a Site to Site VPN Tunnel (SonicOS Enhanced)

10/14/2021 899 People found this article helpful 221,484 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    VPN: Port Forwarding over a Site to Site VPN Tunnel (SonicOS Enhanced)

    Resolution

    Resolution for SonicOS 7.X

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.

    Feature/Application:

    This article describes a scenario where a Site to Site VPN tunnel has been established between Site A and Site B; a Server behind Site A needs to be accessed by using the WAN IP address of Site B.

    For the purpose of this article, we’ll be using the following IP addresses as examples to demonstrate the NAT policy creation. You can use these examples to create a NAT policy for your network, substituting your IP addresses for the examples shown here:

                          

    Site A : TZ 670

    X1 WAN IP: 67.115.118.68/27
    X0 LAN Subnet: 192.168.1.0/24
    Terminal Server on LAN: 192.168.1.2
    Site B : TZ 470 

    X1 WAN IP: 59.82.35.86/27
    X0 LAN Subnet: 10.10.10.0/24

        





    Procedure:


    Configuration on Site B SonicWall (TZ 470)


    This article assumes that a site to site VPN tunnel is already established between the two sites and traffic is flowing between them. The process of routing the traffic reaching the X1 interface of Site B SonicWall bound for the server at Site A through the VPN tunnel, involves the following:

    1. Creating an Address Object for the Terminal Server.
    2. Creating a rule from WAN to VPN.
    3. Creating a NAT Policy.


    Creating an Address Object for the Terminal Server:

    • Login to the GUI of SonicWall at Site B
    • Navigate to Object|Match Objects | Addresses.
    • Click on the Add button to create the following address object.
      Image



    Creating a rule from WAN to VPN in the Site B SonicWall.

    • Navigate to the Policy | Rules and Policies | Access Rules.
    • Go to WAN | VPN page.
    • Click on Add to create the following access rule.

      Image



    Creating a NAT Policy in the Site B SonicWall

    • Navigate to the Policy | Rules and Policies | Access Rules.
    • Click on Add to create the following NAT Policy.
      Image
      Image 

    As the request is coming from the Internet and is not part of the VPN tunnel, the purpose of this NAT Policy is to translate the source IP address to that of the X0 (LAN) IP of the SonicWall so it can traverse the tunnel. The server at Site A sees a request from the LAN IP address of the SonicWall at Site B.


    How to Test:

    From the Internet have a host do a remote desktop connection to the ip address, in this case, 59.82.35.86

     

    Troubleshooting:

    • Make sure the Terminal Server address object has zone as VPN.
    • Make sure the Terminal Server's default gateway is pointing to the SonicWall LAN IP address (Site A).
    • Make sure there are no other conflicting NAT Policies or Access Rules at either end to block traffic.
    • Make sure the Terminal Server has Terminal Services enabled and no personal firewall application is blocking it.



    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.

    Feature/Application:

    This article describes a scenario where a Site to Site VPN tunnel has been established between Site A and Site B; a Server behind Site A needs to be accessed by using the WAN IP address of Site B.

    For the purpose of this article, we’ll be using the following IP addresses as examples to demonstrate the NAT policy creation. You can use these examples to create a NAT policy for your network, substituting your IP addresses for the examples shown here:

                         

    Site A : NSA 2400

    X1 WAN IP: 67.115.118.68/27
    X0 LAN Subnet: 192.168.1.0/24
    Terminal Server on LAN: 192.168.1.2
    Site B : NSA 240

    X1 WAN IP: 59.82.35.86/27
    X0 LAN Subnet: 10.10.10.0/24

     




    Image

    Procedure:

    Configuration on Site B SonicWall (NSA 240)

    This article assumes that a site to site VPN tunnel is already established between the two sites and traffic is flowing between them. The process of routing the traffic reaching the X1 interface of Site B SonicWall bound for the server at Site A through the VPN tunnel, involves the following:

    1. Creating an Address Object for the Terminal Server.
    2. Creating a rule from WAN to VPN
    3. Creating a NAT Policy.


    Creating an Address Object for the Terminal Server

    • Login to the GUI of SonicWall at Site B
    • Navigate to Manage | Objects | Address object.
    • Click on the Add button to create the following address object.
    Image

    Creating a rule from WAN to VPN in the Site B SonicWall.

    • Navigate to the Manage | Rules | Access Rules.
    • Go to WAN | VPN page.
    • Click on Add to create the following access rule.
    Image

    Creating a NAT Policy in the Site B SonicWall.

    • Navigate to the Manage | Rules | NAT Policies page.
    • Click on Add to create the following NAT Policy.
    Image

    As the request is coming from the Internet and is not part of the VPN tunnel, the purpose of this NAT Policy is to translate the source IP address to that of the X0 (LAN) IP of the SonicWall so it can traverse the tunnel. The server at Site A sees a request from the LAN IP address of the SonicWall at Site B.

    How to Test:

    From the Internet have a host do a remote desktop connection to the ip address, in this case, 59.82.35.86

     


     

    Troubleshooting:

    • Make sure the Terminal Server address object has zone as VPN.
    • Make sure the Terminal Server's default gateway is pointing to the SonicWall LAN IP address (Site A).
    • Make sure there are no other conflicting NAT Policies or Access Rules at either end to block traffic.
    • Make sure the Terminal Server has Terminal Services enabled and no personal firewall application is blocking it.




    Resolution for SonicOS 6.2 and Below

    The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.

    Feature/Application:

    This article describes a scenario where a Site to Site VPN tunnel has been established between Site A and Site B; a Server behind Site A needs to be accessed by using the WAN IP address of Site B.

    For the purpose of this article, we’ll be using the following IP addresses as examples to demonstrate the NAT policy creation. You can use these examples to create a NAT policy for your network, substituting your IP addresses for the examples shown here:

                         

    Site A : NSA 2400

    X1 WAN IP: 67.115.118.68/27
    X0 LAN Subnet: 192.168.1.0/24
    Terminal Server on LAN: 192.168.1.2
    Site B : NSA 240

    X1 WAN IP: 59.82.35.86/27
    X0 LAN Subnet: 10.10.10.0/24

     





    Image

    Procedure:

    Configuration on Site B SonicWall (NSA 240)

    This article assumes that a site to site VPN tunnel is already established between the two sites and traffic is flowing between them. The process of routing the traffic reaching the X1 interface of Site B SonicWall bound for the server at Site A through the VPN tunnel, involves the following:

    1. Creating an Address Object for the Terminal Server.
    2. Creating a rule from WAN to VPN
    3. Creating a NAT Policy.


    Creating an Address Object for the Terminal Server

    • Login to the GUI of SonicWall at Site B
    • Navigate to Network | Address object.
    • Click on the Add button to create the following address object.
    Image

    Creating a rule from WAN to VPN in the Site B SonicWall.

    • Navigate to the Firewall | Access Rules.
    • Go to WAN | VPN page.
    • Click on Add to create the following access rule.
    Image

    Creating a NAT Policy in the Site B SonicWall.

    • Navigate to the Network | NAT Policies page.
    • Click on Add to create the following NAT Policy.
    Image

    As the request is coming from the Internet and is not part of the VPN tunnel, the purpose of this NAT Policy is to translate the source IP address to that of the X0 (LAN) IP of the SonicWall so it can traverse the tunnel. The server at Site A sees a request from the LAN IP address of the SonicWall at Site B.

    How to Test:

    From the Internet have a host do a remote desktop connection to the ip address, in this case, 59.82.35.86

     


     

    Troubleshooting:

    • Make sure the Terminal Server address object has zone as VPN.
    • Make sure the Terminal Server's default gateway is pointing to the SonicWall LAN IP address (Site A).
    • Make sure there are no other conflicting NAT Policies or Access Rules at either end to block traffic.
    • Make sure the Terminal Server has Terminal Services enabled and no personal firewall application is blocking it.


    Related Articles

    • How to get the URI associated to the Viruses being blocked by SonicWall?
    • SonicWall SonicOS 7 Dashboard Threat Page Features
    • How to upgrade from 6.5.0 to 6.5.4 firmware version on Gen6.

    Categories

    • Firewalls > TZ Series
    • Firewalls > SonicWall SuperMassive E10000 Series
    • Firewalls > SonicWall SuperMassive 9000 Series
    • Firewalls > SonicWall NSA Series

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2023 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top