How to configure Global VPN Client (GVC) on SonicWall Next-Gen Firewall

In this article, we will configure the Global VPN Client (GVC) configuration on the SonicWall Next-Gen Firewall. SonicWall Firewall allows you to connect your internal resources using a Global VPN. The only requirement for a Global VPN is you must have reachability to the SonicWall Firewall. So, let’s start!

Scenario – Global VPN configuration on the SonicWall Firewall

You just need to understand the following scenario, which is used in this article. IP address 1.1.1.1/30 is assigned on the SonicWall X1 interface. As pe our setup, the X1 is the WAN Interface. We will install the SonicWall Global VPN Client (GVC) on the Windows 7 system. Windows 7 PC has proper reachability to 1.1.1.1 i.e. SonicWall WAN Interface through the Internet. You can consider the following network topology:

how-to-configure-global-vpn-client-on-sonicwall-firewall

How to configure a SonicWall Firewall for Global VPN Client (GVC)

The Global VPN Client (GVC) uses the IPSec tunnel with the SonicWall appliance. As we already discussed, you must have reachability to the SonicWall firewall to connect the Global VPN Client (GVC). In this article, we will use the SonicWall official Global VPN Client (GVC). The below steps will cover all basics to the advanced configuration of GVC on a SonicWall firewall.

Note: You must have proper Administrator Privileges to configure SonicWall Appliance!

Step 1: Download and Install the Global VPN Client (GVC) from MySonicWall Portal

First, you need to download and install the SonicWall Global VPN Client (GVC) from your MySonicwall Portal. You can download it free from your MySonicWall Portal. Visit, MySonicWall Portal and navigate to Resources & Support >> Download Center >> Download Global VPN Client as per your system architecture. You just need to initiate the setup using Administrator Privilege and Install the Setup.

Must Read :  How to configure SSL VPN on SonicWall Next-Gen Firewall | NetExtender

mysonicwall-support-portal-download-gvc

Step 2: Configuring the WAN GroupVPN for Global VPN Client

Now, we need to configure the SonicWall Firewall to accept the Global VPN Client requests. Login to the SonicWall Firewall and Navigate to VPN >> Settings. Make sure to enable the VPN Global Settings. Now, navigate to VPN Policies on the same page and make sure to enable the WAN GroupVPN.

sonicwall-vpn-settings

Now, click on the Edit icon to configure the WAN GroupVPN. Here, you need to configure the different parameters to accept requests from SonicWall Global VPN Client.

In the General Tab, you need to define the Authentication Method. Here, you can configure either the Pre-Shared key method or you can authenticate the client using Certificates. However, in most cases, we use the Pre-Shared Key.

Note: Pre-Shared key should be strong. It can contain number, alphanumeric and special characters!

wan-group-vpn-general

How, in the Proposal Tab, we need to define the Phase1 and Phase 2 Parameters like Encryption, Authentication and key lifetime. Encryption, Authentication parameters are used to encrypt the VPN as well as Network Traffic.

wan-group-vpn-proposal

Now, in the Advanced Tab, you need to select the Authentication Group to Authenticate the requests from the Global VPN Client. By default, the Trusted Users Group is selected. However, you can configure different groups as well.

Also, if you need to manage the SonicWall appliance over the Global VPN Client, you need to select HTTPS/SSH depending on your requirements.

wan-group-vpn-advanced

Here, I’m leaving the Client settings to default. However, we will discuss this in upcoming articles.

Step 3: Configuring Users for Global VPN Client in SonicWall Firewall

Now, we need to configure the Users for the Authentication. We will create local users for authentication on Global VPN Client. However, you can use LDAP, Radius for the user’s authentication. Navigate to Users >> Local Users & Group >> Local Users and click on Add. A new popup window will appear. Here, you need to define the Name and Password for the User.

Note: In this example, I’m using a user with Username test & Password Password@123.

creating-users-in-sonicwall-settings

Now, click on Groups. In step 2, Advanced Tab, we define the Authentication Group to Trusted Users. So, make sure that the user test is a member of the Trusted Users Group.

creating-users-in-sonicwall-groups

Now, click on the VPN Access Tab, and select the Networks you want to access using the Global VPN Client. However, you must configure the Access Rule to access the defined routes.

Must Read :  IPSec tunnel between FortiGate and SonicWall Firewall

creating-users-in-sonicwall-vpn-access-route

Leave the Bookmarks tab settings to default and press OK.

Step 4: Configuring the Access Rule for Global VPN Client

When we configure the WAN GroupVPN in step 2, the SonicWall Firewall automatically adds some rules from VPN to LAN Zone. However, it is always recommended to modify the automatically created rules. So, Navigate to Firewall >> Access Rules and click on Add. You can configure the Access Rule as per your requirement. For example, I want to LAN Subnet access from the SonicWall Global VPN Client to a specific user test. You can refer to the below screenshot for the configuration.

Note: Ignore if you get any warning message.

configuring-access-rule-for-vpn-in-sonicwall

Step 5: Adding a New Connection Profile to SonicWall Global VPN Client

In step 1, we have successfully installed the SonicWall Global VPN Client on the test machine. Now, we need to add a new connection profile with respect to the SonicWall configuration. Click on the Add (+) button on the Global VPN Client.

adding-connection-profile-in-gvc

Now, a new pop-up window will appear. You need to select Next and define the Connection IP Address & Name as shown below.

new-connection-profile-in-sonicwall

Now, click on Next and Finish the setup.

Step 6: Connecting to the SonicWall Next-Gen Global VPN Client

In the previous step, we have successfully configured New Connection Profile in Global VPN Client. Now, you need to Enable the configured Connection Profile. Just click on Enable Icon.

sonicwall-gvc-setup

Once, you enable the Connection Profile, you need to provide the Pre-Shared Key, which we created in Step2 and click Ok.

Must Read :  How to disable windows Firewall using cmd

pre-shared-key-for-gvc

Now, you need to provide the username and password for authentication. As we already created the Local Users in Step 3, we need to define that credentials here.

client-authentication-for-gvc

Upon successfully authenticated, you can check that we are successfully connected to the SonicWall Global VPN Client.

gvc-connected-to-the-office-firewall

Step 7: Verifying the Access to the internal resources

In step 6, we had successfully configured and connected to the SonicWall Global VPN Client. However, here we will check the connectivity to the internal resources using the ping utility. I have one live machine, in my LAN Zone. So, I’m imitating the ping from the VPN Client system.

reachabillity-to-the-lan-subnet

So, in this way, we have successfully verified the connectivity towards the LAN Resources.

References

Related Articles

Summary

In this article, we successfully configured the SonicWall Global VPN Client configuration on the SonicWall Next-Gen Firewall. We enable the default WAN GroupVPN Policy. We configured the Pre-Shared Key for the IPSec Phase 1. Then, we configured the Trusted Users Group for the Authentication. We also allowed the HTTPS/SSH Management over the Global VPN Client. In Access Rule, we configured the custom Access Rule for the Network Traffic. Last, we download and install the SonicWall Global VPN Client on the test PC. We are able to communicate with the LAN resources.

Did you like this article. Please comment in the comment box for any further information.

Leave a Reply

Your email address will not be published. Required fields are marked *

Share via
Copy link
Powered by Social Snap