To connect to SonicWall Global VPN client, you first need to download and install the software on your computer. Once installed, open the program and click “Connect”. Enter your SonicWALL username and password when prompted and then click “OK”. Your computer will now be connected to the SonicWALL security appliance and all traffic will be encrypted.
If you need to work on your SonicWall configuration remotely, you can use the SonicOS web-based management interface. To access the interface, you’ll need to know your SonicWall’s IP address and have administrative credentials (username and password). Once you have that information, follow these steps:
1. Connect to a network that has access to the Internet.
2. Open a web browser and go to https://
3. When prompted, enter your administrative credentials and click Login.
4. Click System > Licenses > Features Sets and make sure the Enable Management Features Set option is checked/enabled. If it isn’t, check the box and click OK at the bottom of the page. (This step may not be necessary depending on your particular setup.) Exit out of this menu when done..remotely connecting nowdays with cloud storage sites like Google Drive or DropBox) OR if your IT Department gave everyone in the company laptops with VPN software installed – those are two popular ones but there are many more – then all someone needs is an internet connection..which most people have whether they are home or away from their office desk.” Adiós!
Once the app has installed, launch it and enter your SonicWall VPN credentials.
Next, launch the Settings app and navigate to Network & Internet | VPN.
Under VPN, select Add a VPN connection.
In the Add a VPN connection window, select SonicWall Mobile Connect as the VPN provider.
Enter the required information and click Save.
Your SonicWall VPN should now be connected.
Connecting on the Meraki Dashboard
1. Log in to the Meraki Dashboard and navigate to Security appliance > Site-to-site VPN.
2. Under ClientRemote address(es), add the public IP addresses or hostnames of any clients that will be connecting to this VPN. Add one address per line.
3. Click Save changesat the bottom of the page.
You can now use your client’s public IP addresses/hostnames to connect to the VPN! If you want more fine-tuned control over who can connect and when, see below for instructions on adding firewall rules. Adding Firewall Rules (Optional) By default, anyone with your Client VPN subnet’s range will be able to attempt a connection once they have authenticated with a valid username and password However, you may want some users to be always allowed while others must request access (like with an Austin Ping). Or maybe you only want certain devices connected at certain times of day To add these types of rules: Navigate to Security appliance > Configure > Firewall rulesand click Add a rule at the top right Select Client VPN asthe rule type Give your firewall rulea name (for organizational purposes) Set Conditionsto restrict traffic by schedule, user/group, or subnet Create whichever Exceptionally Allowedyou need then click Save Click Commitat the top right That’s it! You should now see your new firewall rule under Security appliance > Configure > Firewall rules
Thank your for reading!