Great Great Soniwall Natting
Great Great Soniwall Natting
Great Great Soniwall Natting
Support
Knowledge Base
?
Welc ome Guest | Log In |
SuperMassive / NSA / TZ series > 1.6 Firewall > Firewall Access Rules
Rat ing: 9.20 out of 10 (51 Ratings) Rate Art icle Relat ed Co nt ent (12)
Gen5: NSA 8510, NSA 8500, NSA E7500, NSA E6500, NSA E5500, NSA 5000, NSA 4500, NSA 3500, NSA 2400, NSA 2400MX,
NSA 220, NSA 220W, NSA 240, NSA 250M, NSA 250MW
Gen5 TZ series: TZ 100, TZ 100 Wireless, TZ 200, TZ 200 W, TZ 210, TZ 210 W, TZ 215, TZ 215 W, TZ 105, TZ 105W, TZ 205, TZ
205W
Gen4: PRO series: PRO 5060, PRO 4100, PRO 4060,PRO 3060, PRO 2040, PRO 1260.
Gen4: TZ Series: TZ 190, TZ 190 W, TZ 180, TZ 180 W, TZ 170, TZ 170 W, TZ 170 SP, TZ 170 SP Wireless.
Firmware/So ft ware Versio n: All Version (SonicOS Enhanced only). For Instructions on SonicOS Standard refer KBID 3703
Services: Port forw arding (NAT policies, Address objects, firew all access rules).
Feature/Application:
Manually opening Ports to allow (Webserver, FTP, Email, Terminal Service, etc.) from Internet to a server behind the
SonicWALL in SonicOS Enhanced involves the following steps:
Recommendat ion: The Public Server Wizard quickly configure your SonicWALL to provide public access to an internal
server. The Public Server Wizard is the most ambitious and functional wizard developed to date. It simplifies the complex
process of creating a publicly and internally accessible server resource by automating above mentioned steps. Please refer
KBID 7027 and KBID 4178 for complete instructions.
Alert : The SonicWALL security appliance can be managed using HTTP (Port 80) or HTTPS (443) and a Web browser. Both
HTTP and HTTPS are enabled by default. If you are using the SonicWALL WAN IP address for HTTP or HTTPS port forwarding
to a server, then the default Management port must be changed to another unused port number (e.g. 8080, 444, 4443,
etc.). You can change this under the Sy st em > Administ rat ion page.
Scenario:
The following example covers allowing HTTP (webserver) service from the Internet to a server on the LAN with private IP
address as 192.168.1.100. Once the configuration is complete, Internet users can access the HTTP (webserver) service
behind the SonicWALL UTM appliance through the WAN (Public) IP address 1.1.1.1.
Procedure:
In this example we have chosen to demonstrate using HTTP service, however the following steps apply to any service you
wish to use (like HTTPS, SMTP, FTP, Terminal Services, SSH, etc).
Name:
Mywebserver
Public
Zone
Assignment: WAN
Type: Host
IP Address: 1.1.1.1
Understanding how to use NAT policies starts with the construction of an IP packet. Every packet contains addressing
information that allows the packet to get to its destination, and for the destination to respond to the original requester.
The packet contains (among other things) the requester’s IP address, the protocol information of the requestor, and the
destination’s IP address. The NAT Policies engine in SonicOS Enhanced can inspect the relevant portions of the packet and
can dynamically rewrite the information in specified fields for incoming, as well as outgoing traffic.
Not e: Creat e a reflect ive policy : When you check this box, a mirror outbound or inbound NAT policy for the NAT policy you
defined in the Add NAT Policy w indow is automatically created.
Loopback Policy:
If you wish to access this server from other internal zones using the Public IP address 1.1.1.1 consider creating a
Loopback NAT Policy else go t o next st ep:
4. Upon completion under Net work > Nat Policies tab the above Inbound and Out bond NAT policies will be created.
Caut ion: The ability to define network access rules is a very powerful tool. Using custom access rules can disable firewall
protection or block all access to the Internet. Use caution when creating or deleting network access rules.
Action: Allow
From Zone: WAN
To Zone: LAN
Service: HTTP
Source: Any
Source: Any
Destination: My webserver Public
Users Allowed: All
Schedule: Always on
Enable Logging: checked
Allow Fragmented Packets:
checked
4. Under the Advanced tab, you can leave the “Inact ivit y Timeout in Minut es” at 15 minutes. Some protocols, such as
Telnet, FTP, SSH, VNC and RDP can take advantage of longer timeouts where increased values like 30 or 60 minutes can be
tried with caution in those cases. Longer timeout values will not help at all for HTTP or HTTPS.
5: Click OK.
See Also:
KBID 7027: UTM: How to quickly open ports (port forwarding) using wizards? (SonicOS Enhanced)
Related Articles