Manually you can open different Ports to allow (Webserver, FTP, Email, Terminal Service, VNC, etc.) from the Internet to a server behind the SonicWALL Firewall.
To open Ports to a Server you need follow the below steps:
- Creating a Custom Service or Services.
- Creating the necessary Address Objects.
- Defining the appropriate NAT Policies (Inbound, Outbound, and Loopback).
- Creating the necessary WAN, Zone Access Rules for public access.
Procedure:
Step 1: Creating a Custom Service for "TightVNC".
- In the left panel click to expand "Firewall > Services".
- I the right panel click to select "Custom Services".
- On "Services" click to "Add" button.
- On the "Add Service" open window, type the following data:
- Protocol: "click to expand" and select "TCP"
- Port Range: 5900 - 5900
- Then click on "Add" button.
- In the left panel click to expand "Network > Address Objects".
- Click on "Add" button to create "Server IP on LAN" Address Object.
- On the "Network Security Appliance" open windows, type the following data:
- Zone Assignment: LAN
- Type: Host
- IP Address: "Here type the Server or Computer IP address" e.g: 192.168.1.34
- Click "OK" button to create the "Server Public" Address Object.
- Click on "Add" button to create "Public IP" Address Object.
- On the "Network Security Appliance" open windows, type the following data:
- Zone Assignment: WAN
- Type: Host
- IP Address: "Here type the Pubic IP Address" e.g: 1.1.1.1
- Click "OK" button to create the "Public IP" Address Object.
- In the left panel click to expand "Network > NAT Policies".
- Click on "Add" button to create "NAT Policy" and chose the following settings from the drop-down menu:
- Translated Source: Original
- Original Destination: TightVNC Public
- Translated Destination: TightVNC Private
- Original Service: TightVNC
- Translated Service: Original
- Inbound Interface: Any
- Outbound Interface: Any
- Comment: TightVNC behind SonicWALL
- Click to check "Enable NAT Policy"
- Click to check "Create a reflexive policy". When you check this box, a mirror outbound NAT policy for the NAT policy you define Policy window is automatically created.
- Click "Add" button.
- Click on "Add" button to create "Loopback Policy" and chose the following settings from the drop-down menu:
- Translated Source: TightVNC Public
- Original Destination: TightVNC Public
- Translated Destination: TightVNC Private
- Original Service: TightVNC
- Translated Service: Original
- Inbound Interface: Any
- Outbound Interface: Any
- Comment: Loopback Policy
- Click to check "Enable NAT Policy"
- Unchecked "Create a reflexive policy".
- Click "Add" button.
- In the left panel click to expand "Firewall > Access Rules" tab.
- In view style click to select "Matrix".
- Click to select "From: WAN to: LAN".
- Click "Add" button.
- In "Add Rule" open window entry the following into the fields:
- From Zone: WAN
- to Zone: LAN
- Service: TightVNC
- Source: Any
- Destination: TightVNC Public
- Users Allowed: All
- Schedule: Always on
- Comment: Server behind SonicWALL
- Click to check "Enable Logging" and "Allow Fragmented Packets".
- Click on "OK" buttom.
Congratulation!!! Now you can connect remotely using TightVNC tool.
Awesome job! I had to forward several ports, and with no sonicwall experience, it seemed daunting, however using your page as a guide, I was able to get all of them forwarded and remote access to the device behind it. Thank you!
ReplyDeleteThanks for the guide.
ReplyDeleteAfter port forward is set you can test it at :
http://www.portcheckers.com
how to install TightVNC. where it is placed help me....
ReplyDeleteGo to http://www.tightvnc.com/download.php and download the version of TightVNC that you need, and install TightVNC in the computer do you want to access from Internet.
ReplyDeleteWorks Beautifully. Simple guide!
ReplyDelete