Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

SSL VPN Access

To all, I am trying to restrict specific users to ONLY access specific subnets when the VPN in while others that are part of the same group need to have all access. My client SSLVPN has the 3 available subnets listed, My group VPN under users has all available networks available to the users that are part of the group and my test user ONLY has 1 subnet assigned. However this test user when logging in has access to all 3 subnets.

Category: Mid Range Firewalls
Reply

Best Answer

  • CORRECT ANSWER
    PochoPocho Newbie ✭
    Answer ✓

    As far as I know privileges are inherited so if the group has access to all the users belonging to the group would all have access to what the group says on top of whatever the user itself has, so I think the users that need all access need a separate group that the test user does not belong to, then you would assigned all privileges on the new group and the test user separately leaving the original group without any privileges. I think it would be something like SSLVPN Services (no privileges on the VPN tab), having the new group (privileges to all) as a member and the test user (limited access) as a member as well

Answers

  • pja6161pja6161 Newbie ✭

    Thanks Pocho. I will try what you suggested. I would think this would work in the opposite direction where users of the group get the group access and then restricting more to a specific user but I will see what happens.

    Thanks

  • pja6161pja6161 Newbie ✭

    I confirmed that permissions work from the bottom up not top down.

    I restricted the group and gave the test user more access.

    This resolved the issue.

  • pja6161pja6161 Newbie ✭

    Sorry to return to this chat.

    I created a separate group and restricted the test user to 2 subnets and 1 host. The host is part of a 10.254.x.x/24 subnet. However this test user has access to other devices within that subnet. Not working as expected

  • PochoPocho Newbie ✭

    mmm that is strange, I just tested it really quick on a TZ 670 running the latest firmware and it works. On my case I have the SSLVPN with routes to the X0 and X7 subnets for the client routes under NETWORK > SSLVPN > Client Settings > Default Device Profile > Client Routes. Then the Test User is part of the SSLVPN services group which has X7 and X0 subnet under the VPN tab, and the user itself has a single IP from the X0 subnet and the X7 subnet for the VPN Access tab. With this I can reach everything on the X7 subnets and only the 1 IP on the X0 subnet when i connect with the SSLVPN.

    Maybe you are pulling a privilege from somewhere else, When you connect if you go to NETWORK > USERS > Status > then mouse over the user groups for the test user, check all the groups that it shows and then compared the VPN access tab on each one of them to see if something is giving it more access that it should

  • pja6161pja6161 Newbie ✭

    This is strange. the test user is part of a group I pulled them out of and in the new group. When I check the group that I pulled it our of and look at members the test user is not in the group yet when I mouse over as you mentioned they show in the group. I am rebooting the FW to see what happens.

  • pja6161pja6161 Newbie ✭

    Ok, this is how I got it to work and why it did not work as expected.

    Why it did not work.

    1. under users/groups/sslvpn services group I had my users as members
    2. I created 2 new groups and added the sslvpn services to those groups along with the users I wanted as part of those groups
    3. It appears that when you vpn in the 2 new groups inherited each other along with the network hosts/subnets that belonged to each group.

    Getting it to work.

    1. I removed the users from the sslvpn services group and added the 2 new groups into the sslvpn services group
    2. I have members belonging to the 2 new groups only in those groups along with the network access required

    In order to get this to work originally I followed kb

    https://www.sonicwall.com/support/knowledge-base/ssl-vpn-client-is-connected-and-authenticated-but-can-t-access-internal-lan-resources/170503557761052

    Which resolved my original issue but I needed to restrict more based on user access.

    I appreciate all the input but I think I am all set for now.

Sign In or Register to comment.