Global Vpn Sonicwall Download

0 views
Skip to first unread message

Ailene Goldhirsh

unread,
Aug 5, 2024, 3:44:10 AM8/5/24
to passfinklallnas
Ihave a SonicWall device, and I am new to them.I created the global vpn and, after installing the SonicWall at the customer's site, wanted to make some configuration changes. I am using the global vpn client and I get connected to the SonicWall. I get an IP address from the SonicWall but I do not know how to access the SonicWall once connected. How can I access the SonicWall? 192.168.1.1 is the IP address for administrating the SonicWall, and it is also the default gateway. My own subnet is 192.168.199.1. So, how does it work? Do I need to enable or disbale something, or is there another way to do it? I tried putting 192.168.1.1 into Chrome to access it, and tried to ping it from my PC, but neither of those worked.

After doing some cursory research on Sonicwall's website ( -base/ports-used-in-sonicwall-utm-appliance/170504777303884/), it looks like their VPN uses ports 500 and 4500 UDP, and I believe Sophos uses this too for it's IPSec VPN solution. We currently utilize SSL VPN for Sophos do I don't know if that is a conflict, but I wanted to know what I should look at into seeing if I can allow this Guest's VPN out to the WAN without conflicting with any of our services.


Also run packet capture on source IP address of the user when trying to connect to the VPN. Navigate to Diagnostics > Packet capture and see what out interface that traffic is trying to go out? Please PM me with the screenshot of that packet capture.


The only thing keeping me from blowing away the crappy Vista install on my Toshiba laptop and going pure Ubuntu is the fact that I need to VPN to work and they use Sonicwall. Due to some proprietary voodoo used by that particular firewall setup on my work's end, I have to use the Sonicwall client which only runs on Windows.


Yes, there is a Sonicwall NetExtender client that is available for download from sonicwalls website. I use it all the time. Once installed just type netExtender (case sensitive) from the command line and you will be prompted for your creds.


I too, the same stage now. I did'nt tried OpenSwan VPN. How ever net extender won't help in my case. As per my knowledge we have to configure NetExtender in sonicwall device in-order to use NetExtender client


There is an official knowledge base article from SonicWall here that goes through the steps for Linux installation. They discuss both GUI and command line usage of the netExtender program once installed. The later is nice because you won't have to install additional Java dependencies for the GUI


I wanted to see if I can get some help with some session termination problems that I am experiencing for Global Protect users. Our remote users connect to an on-prem ERP systems through telnet, tcp/23. I recognize that this protocol has inherited performance and security problems, but unfortunately that's what we are given to work with. The bottom line is that Global Protect users get kicked off from telnet sessions constantly. Prisma Access is connected through a service connection to our on-prem Sonicwall firewall, where the ERP system lives.


To remediate these telnet issues, I have created an application override policy and attached a custom app-id with max TCP timeouts for tcp/23. This is getting applied to all Global Protect users. I have also increased the TCP timeouts in the Sonicwall firewall. However, users are getting kicked off the session while they are idle. The telnet server is designed to not kick off users for a long period of time, regardless if they're active or not.


I know that the app-id override with max TCP timeouts is working well because that same app override policy fixed the same session kick off issues that we were experiencing for some other users connecting from azure to the same on-prem ERP server.


I have collected some packet capture from the sonicwall firewall and from my computer, and every time I inspect the packets, I see that my Global Protect client is sending TCP Reset requests to the server. I also show in Cortex logs that the reason for the disconnect was client side. I am not sure as to why Global Protect would reset the telnet session all of a sudden.


Just thinking out loud here ... some timed event (for example HIP check occurs every hour by default) or some other event that correlates with the disconnects that could help us further with the investigation ?


Sorry for the late reply @kiwi ... the bottom line of this problem is that the sonicwall firewall needed constant attention because the policy rule that increased TCP timeouts, somehow every 2 weeks or so would become sort of inactive. Every time I increased the TCP time out on that sonicwall rule, users would stop complaining for 2 weeks and then the same story would happen over and over again.


Cyber security technology and online data protection in innovative perception . Concept of technology for security of data storage used by global business network server to secure cyber information . Elements of this image furnished by NASA ( )


She brings more than 18 years of partners experience to the role. In those years she has led, developed, managed, and grown channel ecosystems at Cisco, Office Depot/CompuCon, and JS Group. Ragusa-McBain has led managed services, subscription/consumption models, distribution, and alliances programs. She has served on multiple boards and communities driving DE&I initiatives and developing the next generation of channel talent.


The GMS web application was found to be vulnerable to numerous SQL injection issues. Additionally, security mechanisms that were in place to help prevent against SQL Injection attacks could be bypassed.


The authentication mechanism employed by the GMS /ws application used a non-secret value when performing HTTP digest authentication. An attacker could easily supply this information, allowing them to gain unauthorised access to the application and call arbitrary Web Service methods.


An attacker with knowledge of authentication mechanism would be able to generate valid authentication codes for the GMS Web Services application, and subsequently call arbitrary methods. A number of these Web Service methods were found to be vulnerable to additional issues, such as arbitrary file read and write (see CVE-2023-34135, CVE-2023-34129 and CVE-2023-34134). Therefore, this issue could lead to the complete compromise of the host.


The GMS /appliance application uses a hardcoded key value to generate password reset keys. This hardcoded value does not change between installs. Furthermore, additional information used during password reset code calculation is non-secret and can be discovered from an unauthenticated perspective.


An attacker with knowledge of the hardcoded 3DES key used to validate password reset codes could generate their own password reset code to gain unauthorised, administrative access to the appliance. An attacker with unauthorised, administrative access to the appliance could exploit additional post-authentication vulnerabilities to achieve Remote Code Execution on the underlying device. Additionally, they could gain access to other devices managed by the GMS appliance.


The authentication mechanism used by the CAS Web Service (exposed via /ws/cas) did not adequately perform authentication checks, as it used a hardcoded secret value to perform cryptographic authentication checks. The CAS Web Service validated authentication tokens by calculating the HMAC SHA-1 of the supplied username. However, the HMAC secret was static. As such, an attacker could calculate their own authentication tokens, allowing them to gain unauthorised access to the CAS Web Service.


The GMS application was found to lack sanitization of user-supplied parameters when allowing users to search for log files on the system. This could allow an authenticated attacker to execute arbitrary code with root privileges.


An authenticated, administrative user can execute code as root on the underlying file system. For example, they could use this vulnerability to write a malicious cron job, web-shell, or stage a remote C2 payload. Note that whilst on its own this issue requires authentication, there were other issues identified (such as CVE-2023-34123) that could be chained with this vulnerability to exploit it from an initially unauthenticated perspective.


This issue can be chained with CVE-2023-34124 to read the administrator password hash from an unauthenticated perspective. Following this, an attacker could launch further post-authentication attackers to achieve Remote Code Execution.


The GMS application was found to lack sanitization of user-supplied parameters when downloading backup files. This could allow an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges.


An authenticated, administrative user can read any file on the underlying file system. For example, they could read the password database to retrieve user-passwords hashes, or other sensitive information. Note that whilst on its own this issue requires authentication, there were other issues identified (such as CVE-2023-34123) that could be chained with this vulnerability to exploit it from an initially unauthenticated perspective.


The GMS application was found to lack sanitization of user-supplied parameters when allowing users to upload files to the system. This could allow an authenticated upload files anywhere on the system with root privileges.


An authenticated, administrative user can upload files as root on the underlying file system. For example, they could use this vulnerability to upload a web-shell. Note that whilst on its own this issue requires authentication, there were other issues identified (such as CVE-2023-34124) that could be chained with this vulnerability to exploit it from an initially unauthenticated perspective.


A web service endpoint was found to be vulnerable to directory traversal whilst extracting a malicious ZIP file (a.k.a. ZipSlip). This could be exploited to write arbitrary files to any location on disk.

3a8082e126
Reply all
Reply to author
Forward
0 new messages