Manually you can open different Ports to allow (Webserver, FTP, Email, Terminal Service, VNC, etc.) from the Internet to a server behind the SonicWALL Firewall.
To open Ports to a Server you need follow the below steps:
- Creating a Custom Service or Services.
- Creating the necessary Address Objects.
- Defining the appropriate NAT Policies (Inbound, Outbound, and Loopback).
- Creating the necessary WAN, Zone Access Rules for public access.
Procedure:
Step 1: Creating a Custom Service for "TightVNC".
- In the left panel click to expand "Firewall > Services".
- I the right panel click to select "Custom Services".
- On "Services" click to "Add" button.
- On the "Add Service" open window, type the following data:
- Protocol: "click to expand" and select "TCP"
- Port Range: 5900 - 5900
- Then click on "Add" button.
- In the left panel click to expand "Network > Address Objects".
- Click on "Add" button to create "Server IP on LAN" Address Object.
- On the "Network Security Appliance" open windows, type the following data:
- Zone Assignment: LAN
- Type: Host
- IP Address: "Here type the Server or Computer IP address" e.g: 192.168.1.34
- Click "OK" button to create the "Server Public" Address Object.
- Click on "Add" button to create "Public IP" Address Object.
- On the "Network Security Appliance" open windows, type the following data:
- Zone Assignment: WAN
- Type: Host
- IP Address: "Here type the Pubic IP Address" e.g: 1.1.1.1
- Click "OK" button to create the "Public IP" Address Object.
- In the left panel click to expand "Network > NAT Policies".
- Click on "Add" button to create "NAT Policy" and chose the following settings from the drop-down menu:
- Translated Source: Original
- Original Destination: TightVNC Public
- Translated Destination: TightVNC Private
- Original Service: TightVNC
- Translated Service: Original
- Inbound Interface: Any
- Outbound Interface: Any
- Comment: TightVNC behind SonicWALL
- Click to check "Enable NAT Policy"
- Click to check "Create a reflexive policy". When you check this box, a mirror outbound NAT policy for the NAT policy you define Policy window is automatically created.
- Click "Add" button.
- Click on "Add" button to create "Loopback Policy" and chose the following settings from the drop-down menu:
- Translated Source: TightVNC Public
- Original Destination: TightVNC Public
- Translated Destination: TightVNC Private
- Original Service: TightVNC
- Translated Service: Original
- Inbound Interface: Any
- Outbound Interface: Any
- Comment: Loopback Policy
- Click to check "Enable NAT Policy"
- Unchecked "Create a reflexive policy".
- Click "Add" button.
- In the left panel click to expand "Firewall > Access Rules" tab.
- In view style click to select "Matrix".
- Click to select "From: WAN to: LAN".
- Click "Add" button.
- In "Add Rule" open window entry the following into the fields:
- From Zone: WAN
- to Zone: LAN
- Service: TightVNC
- Source: Any
- Destination: TightVNC Public
- Users Allowed: All
- Schedule: Always on
- Comment: Server behind SonicWALL
- Click to check "Enable Logging" and "Allow Fragmented Packets".
- Click on "OK" buttom.
Congratulation!!! Now you can connect remotely using TightVNC tool.