Site to Site VPN Configuration in SonicWall Router:

 Site to Site VPN Configuration in SonicWall Router:

Setting up a site-to-site VPN on a SonicWall router involves several steps. Keep in mind that the specific steps may vary based on the model and firmware version of your SonicWall router. Here's a general guide:

  • We are going do site to site VPN in two group 

    • Group 8 and Group 24  (left side is Group 8 and Right side is Group 24

    • See in the below diagram.

  1. Access the SonicWall Management Interface:

    • Open a web browser and enter the IP address of your SonicWall router.

    • Log in with your administrator credentials.

  2. Navigate to VPN Settings:

    • Locate the VPN settings in the management interface. This is typically found in the "VPN" section.


  • Click on Manage 

  • Click on VPN ( under connectivity) > 

    • Click on Basic settings

  • Now click on Add button

Group 8 SonicWall Router configuration:

  1. Configure General tab

    • Provide Security Policy:

    • Policy Type:

    • Authentication Method

    • Name:

    • IPsec Primary Gateway Name or IP Address of 

In IKE Authentication:

  • Shared secret: 1234567890

  • Confirm shared secret : same

  • Local IKE ID: Group 8 

  • Peer IKE ID: Group 24 


4. Network tab

     Local Networks:

  • Choose local network from list:

    • LAN Subnets

           Remote Networks:

  • Choose destination network from list: create new address object.

(Note: in Network field — Type Group 8 IP Network 192.168.24.0 and mask: 255.255.255.0 )



5. Proposals Tab:

  • Only change

    • Exchange = Main mode

6. In Advanced tab:

  • Checked on : enable keep Alive

  • And checked on: HTTPS 

  • Click on the OK button.


7. You can see the VPN policies name:

Note: Now from Group 24(other group), we will repeat same Steps from step 3 to 6



Group 24 side SonicWall Router configuration:

  1. Configure General tab

    • Provide Security Policy:

    • Policy Type:

    • Authentication Method

    • Name:

    • IPsec Primary Gateway Name or IP Address of 

In IKE Authentication:

  • Shared secret: 1234567890

  • Confirm shared secret : same

  • Local IKE ID: Group 24 

  • Peer IKE ID: Group 8 


4. Network tab

     Local Networks:

  • Choose local network from list:

    • LAN Subnets

           Remote Networks:

  • Choose destination network from list: create new address object.

(Note: in Network field — Type Group 8 IP Network 192.168.8.0 and mask: 255.255.255.0 )



5. Proposals Tab:

  • Only change

    • Exchange = Main mode

6. In Advanced tab:

  • Checked on : enable keep Alive

  • And checked on: HTTPS 

  • Click on the OK button.


7. You can see the VPN policies name: with GREEN light. (group 24 side)

8. You can see  Group 8 side also GREEN light



  1. Now you can Ping from both side (Group 8 and Group 24 sides)


Group 24 side: pinging to group 8 (succussed)

Group 24 side: pinging to group 24 (succussed)

If you want to test to RDP you can do that, I mean, now you can able to RDP both sides computer like below:



Group 24 PC IP is using for RDP




Comments

Popular posts from this blog

Intune Windows Autopilot Steps-by-Step.

How to Map Network Drive using Group Policy Preferences?

How to set up a Shared folder in Windows Server 2022?