Restrict SSLVPN access based on Source WAN IP's? (2025)

Table of Contents
Answers Quick Links

radersupport Newbie ✭

July 2020 in SSL VPN

Hi, I'm wondering if there's a way for me to restrict access to the SSL VPN based on a group of whitelisted WAN IP's? The default access rule allows 0.0.0.0/0 access from SSLVPN to VPN, and I'm unable to edit that source group. So I thought maybe a WAN to SSLVPN deny/allow rule combo might work... but I get a 'rule overlap' error.

Any help would be appreciated.

Thanks

Category: SSL VPN

Reply

  • CORRECT ANSWER

    Saravanan Moderator

    July 2020 Answer ✓

    Hi @radersupport,

    Unfortunately, Gen 5 and Gen 5.5 firewalls are not embedded with option to tweak the default rules/policies and hence we are not seeing the prescribed option in your TZ 215 (Gen 5.5) device. The embedded feature is available from Gen 6 firewalls. The alternate way of accomplishing your requirement is to use Geo-IP filter based on access rule. At-least this way you should be able to control the sources IPs to an extent. Please refer below KB article for instructions on configuring Geo-IP filter feature using access rules.

    https://www.sonicwall.com/support/knowledge-base/how-can-i-configure-sonicwall-geo-ip-filter-using-firewall-access-rules/170505480197552/

    Since we are applying Geo-IP based on access rule, only the Geo-IP enabled access rule will have impact and other rules are not affected. We have two ways of achieving your requirement here,

    1. Block all countries in the WAN to WAN SSLVPN access rule and exclude only the SSLVPN users public IP addresses in Geo-IP filter. (or)
    2. Allow the countries in the WAN to WAN SSLVPN access rule meant for the SSLVPN users public IP addresses.

    I can really understand that, this is kind of a long approach that we are trying because there is a limitation with TZ 215, other Gen 5 and 5.5 firewalls with the easiest configuration proposed previously.

    If you are planning to move to Gen 6 firewalls, you can perform a product Secure Upgrade. Please dive into below web-link for more information.

    https://www.sonicwall.com/customers/loyalty-trade-in-program/secure-upgrade-plus/

    Regards

    Saravanan V

    Technical Support Advisor - Premier Services

    Professional Services

    5

Answers

  • Saravanan Moderator

    July 2020 edited July 2020

    Hi @RADERSUPPORT,

    Thanks for reaching out to us on Community.

    We should be able to restrict the access to users based on their public IP's. Please check the WAN to WAN default SSLVPN rule that is, "Any, WAN Interface IP, SSLVPN, Allow" and check if you have an option to change Source field to the custom address object/group.

    Regards

    Saravanan V

    Technical Support Advisor - Premier Services

    Professional Services

  • radersupport Newbie ✭

    July 2020

    Thanks for the quick response @Saravanan

    I'm still having a bit of trouble - this WAN to WAN rule doesn't seem to allow much tweaking, and I'm unable to change it to 'deny'. Forgive my inexperience, but would you be a bit more explicit on the method? Thank you.

  • Saravanan Moderator

    July 2020

    @RADERSUPPORT- Thanks for your immediate response.

    Please try below steps and you should be all set with the requirement.

    • Once logged into your firewall, replace the keyword main in URL with diag (For ex: https://ipaddress/diag.html) and hit enter.
    • Click on Internal Settings and search for the section Firewall Settings.
    • Enable the checkbox "Enable the ability to remove and fully edit auto-added access rules".
    • Click Accept.

    • Navigate to Rules | Access Rules page and visit WAN to WAN rules section.
    • Now, you should be capable of changing the rule with Source to any custom address objects/groups.

    • After modifying the access rule, please save the rule accordingly.

    You are all set then.

    Note: Once done with the rule changes, please revisit the diag page and deselect the option "Enable the ability to remove and fully edit auto-added access rules". Click Accept.

    The modified rule should remain same even after disabling the option from diag page.

    Hope this helps.

    I'm moving this topic to QA category since your post is more of a question and I do this for tracking purpose.

    Have a good day!!!

    Regards

    Saravanan V

    Technical Support Advisor - Premier Services

    Professional Services

  • radersupport Newbie ✭

    July 2020

    @Saravanan It doesn't look like I have that option in internal settings

  • Saravanan Moderator

    July 2020

    @RADERSUPPORT - Luckily we have an KB article on the default access rule edit. I have got it for your reference. This KB would be useful for you in such future scenarios 🙂

    https://www.sonicwall.com/support/knowledge-base/how-to-enable-the-ability-to-remove-and-fully-edit-auto-added-access-rules/170505477737822/

    Regards

    Saravanan V

    Technical Support Advisor - Premier Services

    Professional Services

  • Saravanan Moderator

    July 2020

    @RADERSUPPORT - Please share your device model and firmware version on it.

    Regards

    Saravanan V

    Technical Support Advisor - Premier Services

    Professional Services

  • radersupport Newbie ✭

    July 2020

    It's a TZ 215 on firmware SonicOS Enhanced 5.9.1.13-5o

  • radersupport Newbie ✭

    July 2020

    Thanks for all of your help @Saravanan

    1

  • Saravanan Moderator

    July 2020

    You are Most Welcome @RADERSUPPORT. Thanks for providing us an opportunity to serve you.

    Have a better day.

    Regards

    Saravanan V

    Technical Support Advisor - Premier Services

    Professional Services

    1

  • NirajSojitra Newbie ✭

    June 2021

    I have SonicWall TZ570 and I am not getting main.html url after log into 192.168.1.1?

Sign In or Register to comment.

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

Sign In Register

Quick Links

  • Categories
  • Latest Discussions
  • Best Of...
  • Unanswered

Categories

  • All Categories
  • 4.1K Firewalls
  • 190 Capture Security Center
  • 113 MySonicWall
  • 77 Cloud Secure Edge
  • 161 Email Security
  • 180 EndPoint Security
  • 714 Secure Remote Access
  • 155 Secure Wireless
  • 61 Switches
  • 48 SonicWall University
  • 1 Technical Documentation Center
  • 190 Water Cooler
  • 115 Developer Hub

All Time Community Leaders

  • 2890 Points BWC
  • 2186 Points shiprasahu93
  • 1932 Points TKWITS
  • 1734 Points Saravanan
  • 1213 Points Ajishlal
  • 1122 Points Arkwright
  • 970 Points Larry
  • 874 Points preston
  • 646 Points MustafaA
  • 521 Points MitatOnge

Weekly Community Leaders

  • 10 Points e__n
  • 5 Points PaulJ
  • 5 Points kikep
  • 5 Points KaranM
  • 3 Points Arkwright
  • 2 Points BWC
  • 1 Point Espen_Langøy
  • 1 Point StefanvGils
  • 1 Point Simon_Weel
Restrict SSLVPN access based on Source WAN IP's? (2025)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 6308

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.