<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.3av.us/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.3av.us/feed.php">
        <title>Antonio Perez - sonicwall:vpn</title>
        <description></description>
        <link>https://wiki.3av.us/</link>
        <image rdf:resource="https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png" />
       <dc:date>2026-05-02T00:54:41+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:adding_a_subnet_to_an_existing_site_to_site_vpn_tunnel&amp;rev=1661873250&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:adding_a_wireless_network_to_a_site_to_site_vpn_sonicos_enhanced&amp;rev=1606339546&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:bandwidth_management_site_traffic_pre_sonicos_5_8_1_firmware&amp;rev=1606435938&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configure_vpn_sites_to_pass_microsoft_netbios_broadcast_traffic&amp;rev=1606338641&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_a_site_to_site_vpn_between_two_sonicwalls_on_the_same_wan_subnet_with_same_default_gateway&amp;rev=1606182685&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_a_tunnel_interface_vpn_with_dhcp_relay_using_ip_helper&amp;rev=1606436678&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_aggressive_mode_site_to_site_vpn_when_a_site_has_dynamic_wan_public_ip_address&amp;rev=1606256838&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_network_monitor_policies_to_monitor_a_network_path_viability&amp;rev=1606437169&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site_to_site_vpn_policies_using_enterprise_command_line_interface_cli&amp;rev=1606340101&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site_to_site_vpn_using_the_quick_configuration_on_sonicos_enhanced&amp;rev=1607183394&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site-to-site_vpn_over_ospf_using_command_line&amp;rev=1606182125&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site-to-site_vpn_with_manual_key_on_sonicos_enhanced&amp;rev=1606511836&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_vpn_failover_using_static_routes_and_network_monitor_probes&amp;rev=1606512250&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:dynamic_route_based_vpn_in_sonicos_5.9.0-basic_config&amp;rev=1606513938&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_allow_wireless_traffic_over_a_site_to_site_vpn_when_the_wlan_is_bridged_to_the_lan&amp;rev=1606339395&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_site_to_site_vpn_policy_using_main_mode&amp;rev=1607031592&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_site_to_site_vpn_tunnel_between_a_sonicwall_and_linksys_vpn_router&amp;rev=1607031976&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_tunnel_interface_vpn_route-based_vpn&amp;rev=1606339205&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_an_ipv6_ipsec_vpn_in_sonicos_enhanced&amp;rev=1607119939&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_connect_a_playstation_3_ps3_console_to_a_upnp_media_server_over_a_site_to_site_vpn&amp;rev=1606258120&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_control_restrict_traffic_over_a_site_to_site_vpn_tunnel_using_access_rules&amp;rev=1606340820&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_create_a_hub_and_spoke_tunnel_interface_vpn_network_with_osfp&amp;rev=1607172928&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_create_a_mesh_vpn_network_using_tunnel_interfaces_and_ospf&amp;rev=1606340320&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_obtain_certificates_for_vpn_connections&amp;rev=1607178029&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_setup_site-to-site_vpn_with_ike2_dynamic_client_proposal_in_sonicos_6.2_and_above&amp;rev=1606338973&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:implementing_hub_and_spoke_site_to_site_vpn&amp;rev=1606182430&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:port_forwarding_over_a_site_to_site_vpn_tunnel&amp;rev=1607179874&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:site_to_site_vpn_between_a_sonicwall_firewall_and_a_cisco_ios_device&amp;rev=1607180422&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:site_to_site_vpn_using_certificates&amp;rev=1607181910&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=sonicwall:vpn:using_ip_helper_to_obtain_dhcp_over_a_policy-based_site_to_site_vpn_tunnel&amp;rev=1607183824&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png">
        <title>Antonio Perez</title>
        <link>https://wiki.3av.us/</link>
        <url>https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png</url>
    </image>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:adding_a_subnet_to_an_existing_site_to_site_vpn_tunnel&amp;rev=1661873250&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-08-30T15:27:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>adding_a_subnet_to_an_existing_site_to_site_vpn_tunnel</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:adding_a_subnet_to_an_existing_site_to_site_vpn_tunnel&amp;rev=1661873250&amp;do=diff</link>
        <description>Adding a subnet to an existing Site to Site VPN Tunnel

Adding a subnet or subnets to an existing Site to Site VPN Tunnel (SonicOS Enhanced). This scenario based article illustrates how additional subnet/s can be added to an active Site to Site VPN tunnel between two Sonicwall appliances.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:adding_a_wireless_network_to_a_site_to_site_vpn_sonicos_enhanced&amp;rev=1606339546&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:25:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>adding_a_wireless_network_to_a_site_to_site_vpn_sonicos_enhanced</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:adding_a_wireless_network_to_a_site_to_site_vpn_sonicos_enhanced&amp;rev=1606339546&amp;do=diff</link>
        <description>Adding a wireless network to a site to site VPN (SonicOS Enhanced)

This configuration will be based on a site to site VPN in which both sides have a static WAN IP, SonicOS Enhanced is being used, the VPN is configured in Main Mode and one side also has a wireless network.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:bandwidth_management_site_traffic_pre_sonicos_5_8_1_firmware&amp;rev=1606435938&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-27T00:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>bandwidth_management_site_traffic_pre_sonicos_5_8_1_firmware</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:bandwidth_management_site_traffic_pre_sonicos_5_8_1_firmware&amp;rev=1606435938&amp;do=diff</link>
        <description>Bandwidth Management of Site to Site VPN Traffic (Pre SonicOS 5.8.1 firmware)

SonicOS Enhanced offers an integrated traffic shaping mechanism through its Egress (outbound) and Ingress (inbound) bandwidth management (BWM) interfaces. Outbound BWM can be applied to traffic sourced from Trusted and Public Zones (such as</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configure_vpn_sites_to_pass_microsoft_netbios_broadcast_traffic&amp;rev=1606338641&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:10:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configure_vpn_sites_to_pass_microsoft_netbios_broadcast_traffic</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configure_vpn_sites_to_pass_microsoft_netbios_broadcast_traffic&amp;rev=1606338641&amp;do=diff</link>
        <description>Configure VPN sites to pass Microsoft NetBIOS broadcast traffic

Some Microsoft networking environments rely heavily on broadcasts to advertise and locate network resources (servers, print devices, etc). By default, SonicWall devices are configured to not pass these Microsoft NetBIOS broadcasts across VPN tunnels. In this article, we will detail how to configure SonicOS to pass these broadcasts across the VPN tunnel bidirectionally. Please note this may increase traffic in some environments.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_a_site_to_site_vpn_between_two_sonicwalls_on_the_same_wan_subnet_with_same_default_gateway&amp;rev=1606182685&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-24T01:51:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_a_site_to_site_vpn_between_two_sonicwalls_on_the_same_wan_subnet_with_same_default_gateway</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_a_site_to_site_vpn_between_two_sonicwalls_on_the_same_wan_subnet_with_same_default_gateway&amp;rev=1606182685&amp;do=diff</link>
        <description>Configuring a Site to Site VPN between two SonicWalls on the same WAN subnet with same default gateway.

DESCRIPTION:

When an attempt to establish a VPN tunnel between two firewalls using the same gateway IP address and subnet fails, logs in both units may show an error indicating that the remote peer does not respond to phase 1 IKE requests or no negotiation attempts at all. This happens when the upstream gateway is not configured to handle the ARP requests properly. The issue is usually obser…</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_a_tunnel_interface_vpn_with_dhcp_relay_using_ip_helper&amp;rev=1606436678&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-27T00:24:38+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_a_tunnel_interface_vpn_with_dhcp_relay_using_ip_helper</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_a_tunnel_interface_vpn_with_dhcp_relay_using_ip_helper&amp;rev=1606436678&amp;do=diff</link>
        <description>Configuring a Tunnel Interface VPN with DHCP Relay using IP Helper

Step 1: Configure the Tunnel Interface VPN Policy on each unit. This is done under VPN &gt; Settings. On the General tab of the new VPN Policy configuration window, configure the following settings.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_aggressive_mode_site_to_site_vpn_when_a_site_has_dynamic_wan_public_ip_address&amp;rev=1606256838&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-24T22:27:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_aggressive_mode_site_to_site_vpn_when_a_site_has_dynamic_wan_public_ip_address</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_aggressive_mode_site_to_site_vpn_when_a_site_has_dynamic_wan_public_ip_address&amp;rev=1606256838&amp;do=diff</link>
        <description>Configuring Aggressive Mode Site to Site VPN when a Site has Dynamic WAN Public IP address

This solution explains the configuration of a Site to Site VPN on SonicWall appliances when a site has dynamic WAN IP address. The VPN policy is setup using Aggressive Mode.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_network_monitor_policies_to_monitor_a_network_path_viability&amp;rev=1606437169&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-27T00:32:49+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_network_monitor_policies_to_monitor_a_network_path_viability</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_network_monitor_policies_to_monitor_a_network_path_viability&amp;rev=1606437169&amp;do=diff</link>
        <description>Configuring network monitor policies to monitor a network path viability

The Network | Network Monitor page provides a flexible mechanism for monitoring network path viability. The results and status of this monitoring are displayed dynamically on the Network Monitor page, and are also provided to affected client components and logged in the system log.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site_to_site_vpn_policies_using_enterprise_command_line_interface_cli&amp;rev=1606340101&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:35:01+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_site_to_site_vpn_policies_using_enterprise_command_line_interface_cli</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site_to_site_vpn_policies_using_enterprise_command_line_interface_cli&amp;rev=1606340101&amp;do=diff</link>
        <description>Configuring Site to Site VPN policies using Enterprise Command Line Interface E CLI

The following system commands are global and can be executed from anywhere in the config module.

For more...</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site_to_site_vpn_using_the_quick_configuration_on_sonicos_enhanced&amp;rev=1607183394&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T15:49:54+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_site_to_site_vpn_using_the_quick_configuration_on_sonicos_enhanced</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site_to_site_vpn_using_the_quick_configuration_on_sonicos_enhanced&amp;rev=1607183394&amp;do=diff</link>
        <description>Configuring Site to Site VPN using the Quick Configuration on SonicOS Enhanced

The VPN Policy Quick Configuration walks you step-by-step through the configuration of Site to Site VPN on the SonicWall. After the configuration is completed, the wizard creates the necessary VPN settings for the selected VPN policy.You can use the SonicWall Management Interface for optional advanced configuration options.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site-to-site_vpn_over_ospf_using_command_line&amp;rev=1606182125&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-24T01:42:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_site-to-site_vpn_over_ospf_using_command_line</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site-to-site_vpn_over_ospf_using_command_line&amp;rev=1606182125&amp;do=diff</link>
        <description>Configuring Site-to-Site VPN over OSPF using Command Line

OBJECTIVE: Configuring site-to-site VPN over OSPF. The routing protocols can you used carry the traffic across the VPN and will provide seem less inter connectivity from one site to another seamlessly.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site-to-site_vpn_with_manual_key_on_sonicos_enhanced&amp;rev=1606511836&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-27T21:17:16+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_site-to-site_vpn_with_manual_key_on_sonicos_enhanced</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_site-to-site_vpn_with_manual_key_on_sonicos_enhanced&amp;rev=1606511836&amp;do=diff</link>
        <description>Configuring Site-to-Site VPN with Manual Key on SonicOS Enhanced

Step 1: - Click Add on the VPN | Settings page. The VPN Policy window is displayed.
Step 2: - In the General tab of the VPN Policy window, select Manual Key from the IPsec Keying Mode menu. The VPN Policy window displays the manual key options.
Step 3: - Enter a name for the policy in the Name field.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_vpn_failover_using_static_routes_and_network_monitor_probes&amp;rev=1606512250&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-27T21:24:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuring_vpn_failover_using_static_routes_and_network_monitor_probes</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:configuring_vpn_failover_using_static_routes_and_network_monitor_probes&amp;rev=1606512250&amp;do=diff</link>
        <description>Configuring VPN Failover using Static Routes and Network Monitor Probes

This article illustrates a scenario wherein two sites with SonicWall UTM devices are connected to each other
over a direct connection or an MPLS connection. A site to site VPN connection is defined concurrently between the two sites. The primary connection between the two sites is the direct or the MPLS connection and when it fails, traffic would automatically be routed through a site to site VPN (policy based).</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:dynamic_route_based_vpn_in_sonicos_5.9.0-basic_config&amp;rev=1606513938&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-27T21:52:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dynamic_route_based_vpn_in_sonicos_5.9.0-basic_config</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:dynamic_route_based_vpn_in_sonicos_5.9.0-basic_config&amp;rev=1606513938&amp;do=diff</link>
        <description>Dynamic Route Based VPN in SonicOS 5.9.0 - Basic Config
The first step involves creating a Tunnel Interface VPN policy . The crypto 
suites used to secure the traffic between two end-points are defined in the policy.
The second step is to create a new Tunnel Interface under Network | Interfaces.
The third step involves configuring OSPF for the Tunnel Interface under Network.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_allow_wireless_traffic_over_a_site_to_site_vpn_when_the_wlan_is_bridged_to_the_lan&amp;rev=1606339395&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:23:15+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_allow_wireless_traffic_over_a_site_to_site_vpn_when_the_wlan_is_bridged_to_the_lan</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_allow_wireless_traffic_over_a_site_to_site_vpn_when_the_wlan_is_bridged_to_the_lan&amp;rev=1606339395&amp;do=diff</link>
        <description>How to allow wireless traffic over a site to site VPN when the WLAN is bridged to the LAN

When setting up a site to site VPN with the WLAN bridged, even though the WLAN is in the same subnet as the LAN, it will not be able to pass traffic over the site to site VPN. This is due to the zone based rules. By default rules are created for the</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_site_to_site_vpn_policy_using_main_mode&amp;rev=1607031592&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-03T21:39:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_configure_a_site_to_site_vpn_policy_using_main_mode</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_site_to_site_vpn_policy_using_main_mode&amp;rev=1607031592&amp;do=diff</link>
        <description>How to Configure a Site to Site VPN Policy using Main Mode

Step 1: Creating Address Objects for VPN
subnets:
1. Login to the SonicWall Management Interface
2. Click Manage in the top navigation menu
3. Navigate to Objects | Address Objects, scroll down to the bottom of the page and click on Add button.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_site_to_site_vpn_tunnel_between_a_sonicwall_and_linksys_vpn_router&amp;rev=1607031976&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-03T21:46:16+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_configure_a_site_to_site_vpn_tunnel_between_a_sonicwall_and_linksys_vpn_router</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_site_to_site_vpn_tunnel_between_a_sonicwall_and_linksys_vpn_router&amp;rev=1607031976&amp;do=diff</link>
        <description>How To configure a Site to Site VPN tunnel between a SonicWall and Linksys VPN Router

First, on the SonicWall, you must create an address object for the remote network.

1)	Log into the SonicWall.
2)	Browse to Manage &gt; Policies

	&quot;&quot;

 &gt; **Objects** &gt; **Address Objects**</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_tunnel_interface_vpn_route-based_vpn&amp;rev=1606339205&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:20:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_configure_a_tunnel_interface_vpn_route-based_vpn</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_a_tunnel_interface_vpn_route-based_vpn&amp;rev=1606339205&amp;do=diff</link>
        <description>How to configure a tunnel interface VPN (Route-Based VPN)

	* Go to Manage | VPN | Base Settings and click on Add.
* The General tab of Tunnel Interface VPN named is shown with the IPSec Gateway equal to the other device&#039;s X1 IP
address.

For more...</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_an_ipv6_ipsec_vpn_in_sonicos_enhanced&amp;rev=1607119939&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-04T22:12:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_configure_an_ipv6_ipsec_vpn_in_sonicos_enhanced</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_configure_an_ipv6_ipsec_vpn_in_sonicos_enhanced&amp;rev=1607119939&amp;do=diff</link>
        <description>How to configure an IPv6 IPSec VPN in SonicOS Enhanced

IPv6 IPSec VPN provides a easy-to-setup, secure solution for connecting mobile users, telecommuters, remote offices and partners via the Internet. Remote office networks can securely connect to your network using site-to-site VPN
connections that enable network-to-network VPN connections.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_connect_a_playstation_3_ps3_console_to_a_upnp_media_server_over_a_site_to_site_vpn&amp;rev=1606258120&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-24T22:48:40+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_connect_a_playstation_3_ps3_console_to_a_upnp_media_server_over_a_site_to_site_vpn</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_connect_a_playstation_3_ps3_console_to_a_upnp_media_server_over_a_site_to_site_vpn&amp;rev=1606258120&amp;do=diff</link>
        <description>How to connect a Playstation 3 (PS3) console to a UPnP Media Server over a site-to-site VPN?

If your Playstation 3 is already turned on, it may initially require a reboot or require that you toggle media server connectivity off, then on before it will discover the media server, or have the ability to connect to it</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_control_restrict_traffic_over_a_site_to_site_vpn_tunnel_using_access_rules&amp;rev=1606340820&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:47:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_control_restrict_traffic_over_a_site_to_site_vpn_tunnel_using_access_rules</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_control_restrict_traffic_over_a_site_to_site_vpn_tunnel_using_access_rules&amp;rev=1606340820&amp;do=diff</link>
        <description>How to control / restrict traffic over a site to site VPN tunnel using Access Rules

This article illustrates how to restrict traffic to a particulare IP Address and /or a Server over a site to site VPN tunnel. This way of controlling VPN traffic can be achieved by Access Rules.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_create_a_hub_and_spoke_tunnel_interface_vpn_network_with_osfp&amp;rev=1607172928&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T12:55:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_create_a_hub_and_spoke_tunnel_interface_vpn_network_with_osfp</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_create_a_hub_and_spoke_tunnel_interface_vpn_network_with_osfp&amp;rev=1607172928&amp;do=diff</link>
        <description>How to create a Hub and Spoke Tunnel Interface VPN network with OSPF

This document explains how to create a Hub and Spoke VPN network architecture using Tunnel Interface and OSPF instead of policy-based Siteto Site VPN tunnels. Dynamic Route-based VPN using Tunnel Interface and OSPF offers a greater flexibility as there is little to do if the network architecture changes.Adding a new Spoke will also begreatly
simplified as all the existing spokes will automatically get the new network architect…</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_create_a_mesh_vpn_network_using_tunnel_interfaces_and_ospf&amp;rev=1606340320&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:38:40+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_create_a_mesh_vpn_network_using_tunnel_interfaces_and_ospf</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_create_a_mesh_vpn_network_using_tunnel_interfaces_and_ospf&amp;rev=1606340320&amp;do=diff</link>
        <description>How to create a mesh VPN network using Tunnel Interfaces and OSPF

It is quite easy to implement a Hub and Spoke VPN network using both Tunnel Interface and OSPF but the transition to a mesh network can be troublesome if you want to redistribute the SonicWall’s firewalled subnets. If you simply use the option “Redistribute Connected Network” in your OSPF configuration, it will perfectly work in hub and spoke environment but will prevent transition to a mesh environment as a tunnel interface is c…</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_obtain_certificates_for_vpn_connections&amp;rev=1607178029&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T14:20:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_obtain_certificates_for_vpn_connections</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_obtain_certificates_for_vpn_connections&amp;rev=1607178029&amp;do=diff</link>
        <description>How to obtain certificates for VPN connections

Using digital certificates for authentication instead of preshared keys in VPNs is considered more secure. In SonicWall UTM devices, digital certificates are one way of authenticating two peer devices to establish an IPsec VPN tunnel. The other is IKE using preshared key. The KB article describes the method to configure WAN GroupVPN and Global VPN Clients (GVC) to use digital certificates for authentication before establishing an IPsec VPN tunnel.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_setup_site-to-site_vpn_with_ike2_dynamic_client_proposal_in_sonicos_6.2_and_above&amp;rev=1606338973&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-25T21:16:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_setup_site-to-site_vpn_with_ike2_dynamic_client_proposal_in_sonicos_6.2_and_above</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:how_to_setup_site-to-site_vpn_with_ike2_dynamic_client_proposal_in_sonicos_6.2_and_above&amp;rev=1606338973&amp;do=diff</link>
        <description>How to setup Site to Site VPN with IKE2 Dynamic Client Proposal in SonicOS 6.2 and above

SonicOS provides IKEv2 Dynamic Client Support, which provides a way to configure the Internet Key Exchange (IKE) attributes globally rather than configure these IKE Proposal settings on an individual policy basis. This scenario could be used while one site has dynamic WAN IP address. And then on the other site,</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:implementing_hub_and_spoke_site_to_site_vpn&amp;rev=1606182430&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-24T01:47:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>implementing_hub_and_spoke_site_to_site_vpn</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:implementing_hub_and_spoke_site_to_site_vpn&amp;rev=1606182430&amp;do=diff</link>
        <description>Implementing Hub and Spoke Site-to-Site VPN

It is possible to establish a site to site VPN between a hub SonicWall (such as a corporate headquarters) and multiple spoke SonicWalls (branch offices) where the branches are able to communicate using the hub as an intermediary. The purpose of this document is to outline all necessary steps to configure a VPN consisting of ne hub and two spokes where all firewalls are running SonicOS Enhanced. An example is used throughout this document to clarify al…</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:port_forwarding_over_a_site_to_site_vpn_tunnel&amp;rev=1607179874&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T14:51:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>port_forwarding_over_a_site_to_site_vpn_tunnel</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:port_forwarding_over_a_site_to_site_vpn_tunnel&amp;rev=1607179874&amp;do=diff</link>
        <description>VPN: Port Forwarding over a Site to Site VPN Tunnel

Considering anexisting site to site vpn tunnel is created and functional, following are the steps for additional configuration/modification that needs to be done to achieve the above setup. In this knowledge article we will use google.com website ip address which is randomly taken. So in this example, we will route traffic from Remote
Office for google.com website through Head Office firewall ISP.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:site_to_site_vpn_between_a_sonicwall_firewall_and_a_cisco_ios_device&amp;rev=1607180422&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T15:00:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>site_to_site_vpn_between_a_sonicwall_firewall_and_a_cisco_ios_device</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:site_to_site_vpn_between_a_sonicwall_firewall_and_a_cisco_ios_device&amp;rev=1607180422&amp;do=diff</link>
        <description>Site to Site VPN between a SonicWall firewall and a Cisco IOS device

The network configuration shown below is used in the example VPN configuration. The example will configure a VPN using 3DES encryption with MD5 and without PFS.

For more...</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:site_to_site_vpn_using_certificates&amp;rev=1607181910&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T15:25:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>site_to_site_vpn_using_certificates</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:site_to_site_vpn_using_certificates&amp;rev=1607181910&amp;do=diff</link>
        <description>Site to Site VPN Using Certificates

Using digital certificates for authentication instead of pre-shared keys in a site-to-site VPN configuration is considered more secure. This KB article describes the method to configure a site-to-site VPN using digital certificates. Although the devices depicted in this article are an NSA 2400 (Site A) and an NSA 240 (Site B) running SonicOS Ehanced 5.8.1.7 firmware, all SonicWall UTM appliances running either SonicOS Enhanced or Standard firmware support thi…</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=sonicwall:vpn:using_ip_helper_to_obtain_dhcp_over_a_policy-based_site_to_site_vpn_tunnel&amp;rev=1607183824&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-05T15:57:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>using_ip_helper_to_obtain_dhcp_over_a_policy-based_site_to_site_vpn_tunnel</title>
        <link>https://wiki.3av.us/doku.php?id=sonicwall:vpn:using_ip_helper_to_obtain_dhcp_over_a_policy-based_site_to_site_vpn_tunnel&amp;rev=1607183824&amp;do=diff</link>
        <description>Using IP Helper to obtain DHCP over a Policy-based Site to Site VPN Tunnel

In this scenario,the hosts behind Site Bare set to obtain IP addresses dynamically. The goal is to forward the DHCP requests from hosts behind Site B through the tunnel to the DHCP server behind Site A SonicWall. This configuration is different from the DHCP over VPN configuration in that Site A and Site B are to be on different subnets.</description>
    </item>
</rdf:RDF>
