How to Get Past a Sonic Wall Filter

Written by chad anderson
  • Share
  • Tweet
  • Share
  • Pin
  • Email
How to Get Past a Sonic Wall Filter
(Comstock Images/Comstock/Getty Images)

The SonicWALL Content Filtering Service is a service that allows an IT department to restrict the content that reaches their system's users. Often times the indiscriminate restriction of the SonicWALL filter's policies can keep you from accessing your home network or Web mail, making it hard to work efficiently. You can easily bypass the SonicWALL Content Filtering Service by creating an SSH tunnel out of the network.

Skill level:
Moderate

Other People Are Reading

Instructions

  1. 1

    Download and install an SSH client for your operating system. If you are using Linux or Mac OS X, there is probably one already installed. If you are running Windows you will need to download a Windows SSH client.

  2. 2

    Launch a terminal window. You can do this on Windows by typing "cmd" into the Run or Search box from your "Start" menu. On Linux and Mac OS X you can click the terminal application shortcut.

  3. 3

    Type "ssh -L 3000:destination.com:5222 sshserver -N" to create a local port forward to destination.com on port 5222 using "sshserver" as the relay and port 3000 as the local connection port. For example, this would be a way to pass Google talk through the SonicWALL if "destination.com" were "talk.google.com". You could tell your IM client that "localhost:3000" was the server for Google talk, since SSH is waiting for a connection on port 3000 that it can then forward to "sshserver" through the SonicWALL and on to "destination.com:5222".

  4. 4

    Clear the previous command without sending it and type "ssh -D 5222 sshserver -N" to create a dynamic port forward set up using "sshserver" as the relay. This time, SSH listens on port 5222 for any connection type and forwards it to "sshserver" which then forwards it to wherever you choose. This creates a funnel for all of your data that gets sent to "sshserver" on port 22, the ssh port. Point any application's proxy settings at "localhost:5222" to have that application bypass the SonicWALL content filter.

  5. 5

    Select one of these two forwarding types to bypass the SonicWALL Content Filtering Service. Local port forwarding is typically the better option for a single function. Dynamic port forwarding will only be necessary when you have a number of applications to tunnel and do not want to create a single SSH instance for each application.

Tips and warnings

  • SSH tunnels encrypt your data to and from the SSH server. This is a good way to secure your data when using public computers or wireless hotspots.

Don't Miss

Filter:
  • All types
  • Articles
  • Slideshows
  • Videos
Sort:
  • Most relevant
  • Most popular
  • Most recent

No articles available

No slideshows available

No videos available

By using the eHow.co.uk site, you consent to the use of cookies. For more information, please see our Cookie policy.