**EDIT 6/6/2019**
We went out yesterday and replaced the Site 2 SonicWALL SOHO250 with a TZ300 and it started working fine with the exact same configuration. We are going to send the SOHO back to see if it was bad. I thank you all for your assistance with this issue.
Hello everyone, been at this far longer than I care to admit, so I’m hoping someone can help me out here.
Let me start by giving an overview of what I got: we have a site with two locations connected via VPN. Site 1 uses a TZ300, and Site 2 uses a SOHO250. As far as the actual VPN connection between the two sites go, everything is working. I can ping devices on site 2 from site 1 and vice versa. No problems, right?
Well the client needs to be able to access some network resources (specifically, cameras and a customer database) remotely. Since they don’t want this data accessible on the internet, we set them up with the global VPN client. I have managed to get it set up so that they are able to VPN into the Site 1 network and access all resources there with no problems. The issue is that they are unable to access anything on Site 2.
Here’s what I have already done as far as configuration is concerned:-I have already added the remote site’s network to the VPN access list for the user’s account in the sonicwall.
-I have created access rules in both firewalls to allow traffic from appropriate zones to go through (Site 1 has a rule to allow VPN > VPN traffic from “anywhere” to site 2, and vice versa, and site 2 has rules to allow VPN > LAN traffic from site 1 to site 2 and vice versa).
I have used the packet monitor built into the sonicwall to see what is going on. When I ping from my remote system to a device on site 2 (10.10.2.200, let’s say), I do not get a response. The packet monitor shows that traffic is coming into the Site 1 sonicwall and being forwarded to site 2 (as expected), but when it arrives at site 2, it just stops dead. Note here that I do not receive a message stating that the packet was dropped; it just isn’t forwarded like I would normally expect to see. The only message I see is that the packet is “consumed”, which I assume means it is received by the sonicwall to be handled.
I checked the Log and there are no entries for ICMP packets (I made sure to enable all ICMP messages in the log monitor settings, just to be sure). It’s as if the device isn’t even registering that a packet came through at all, even though the packet monitor clearly shows that a packet arrived with its destination marked 10.10.2.200.
On a whim, I decided to start pinging the gateway (10.10.2.1, let’s say) and I was still getting the same issues as above; packet monitor shows the packet being consumed with nothing else happening afterwards.
I checked the Log again and this time saw an error which states “ICMP packet dropped due to Policy” with notes stating “policy not found for packet on Zones (VPN → LAN)”. As stated above, I do not see any instance of packets being dropped in the packet monitor, and I absolutely DO have a rule from VPN → LAN that allows traffic from Site 1 to Site 2’s local IP subnet. There is even a rule to allow management traffic through since I set up the site to site VPN tunnel to allow management traffic so that I wouldn’t have to go to each site manually to configure these things.
I’m stumped. I can’t figure out what it’s trying to tell me here. It sounds like a firewall issue but no manner of access rule configuration seems to satisfy the problem. I even created a rule to specifically allow traffic from my IP address to the device’s IP address and it still won’t allow me to access the device. I even made the network practically wide open allowing “any” connection from “anywhere” access to “anything” and it still tells me that no policy exists for zones (VPN → LAN).
Hopefully I explained that well enough. If anyone needs more information I will be more than happy to provide.
Thank you in advance for your time.