Gns3 Sonicwall

Posted onby admin
Gns3 Sonicwall

Configuring GNS3 for ASAv Firewall Virtual Servers Go to “ Edit “, click on “ Preferences “. On preferences window, under “ QEMU ” option click on “ Qemu VMs ” and then click “ New ” to add to Cisco ASAv firewall virtual servers qcow2 image of the virtual firewall appliance.

Hi Guys! In this article, we will discuss how you can deploy the SonicWall Virtual Firewall in VMWare Workstation. You must have to download the SonicWall virtual Firewall ova file from your SonicWall MySonicWall Portal. In VMWare, you can configure the Virtual SonicWall Firewall in Linux as well as Windows environment. Before starting, it’s required you have a minimum of 8GB of RAM with an i5 or i7 processor. So, let’s start!

Also Read: How to deploy Palo Alto VM Firewall in VMWare

  • Starting with GNS3 2.0, the NAT node became available. This node allows you to connect a topology to internet via NAT. The Internet node was deprecated in favor of this node, and the Cloud node.
  • The GNS3 downloaded file is an executable Windows file. If you have issues downloading, ensure that your security policies such as firewall and antivirus rules allow for the downloading of.exe files. The GNS3-all-in-one package will automatically be downloaded to your PC.

Step 1: Download SonicWall Virtual Firewall

First of all, you have to download your virtual SonicWall Firewall from your MySonicWall Portal. To do this, visit here, and download the SonicWall NSv 200 appliance. By default, you can issue and activate 30 days trial license to your virtual firewall. Further, you need to buy the licenses from SonicWall.

Image Source: SonicWall

Now, we are ready with the SonicWall ova file. Now, follow the next steps.

Step 2: Download and Install VMWare Workstation

After downloading the Virtual Firewall image, you must have to download and install VMWare Workstation. If you already installed it, just skip this step. To download VMWare Workstation, visit the official website VMWare Workstation or download it from any other source. By default, you get 30 days evaluation period, after that, you can purchase it. Once you have installed it, it will be looks like the below image:

Step 3: Configuring your Virtual Network Interfaces for SonicWall Firewall

Now, it’s time to configure your Virtual Network Adaptors as per your requirements. By default, there are only two virtual network interfaces, i.e., VMNet1 and VMNet8. So, click on Windows Start Button and search for Virtual Network Editor. If you are using Linux (i.e. Ubuntu, Mint, etc.) you can type the below command to open Virtual Network Editor. Click on the Add Network and make your virtual interface host only. After that, you have to provide the IP address. For example, I am going to use for the vmnet1 interface.

Step 4: Deploying the SonicWall VM Image in VMWare Workstation

Now time to deploy the SonicWall virtual firewall in VMWare Workstation. Just open the VMWare Workstation and go to Files >> Open (Ctrl+O). Select the ova file you have download from the support portal. This process will take some time, so have patience. After the successful completion of this process, just modify the assigned virtual network interfaces, memory, and processor. In my case, I’m giving 6GB RAM, 2 Processors, and 4 different virtual network interfaces (VMNet1, VMNet8 & VMNet3). As you already know, SonicWall has preconfigured with X0, X1 & X2 interfaces. The VMNet8 interfaces, allows SonicWall to communicate with the Internet and also provide the DHCP IP assignment.

Note: The default IP on X0 (LAN) interface is

Note: 2 CPU Cores and 4 GB RAM is minimum requirement for the SonicWall Firewall. SonicWall NSv200 can support maximum 6 GB of RAM.

Now, power on the SonicWall Firewall to get started! You can get below the screen while the SonicWall Firewall will get booting.

The SonicWall NSv 200 Firewall will take upto 5-6 minutes to complete the booting process.

Step 5: Configuring the SonicWall Firewall to get Management Access

Now, we have just finished the process of deploying the SonicWall firewall in the VMWare Workstation. Since we assign the VMNet8 to the X1 interface. So, we will get an IP from the DHCP. By default, you will get access through the auto-assigned WAN ip address. You can check the ip address of the WAN interface (X1) using the below guide.

Hint: The default username is admin and password is password.

Step 6: Accessing the SonicWall VM Firewall using GUI (Graphical User Interface)

Now, it’s time to testing our configuration and accessing the SonicWall firewall using GUI. To do this, first, we will check the connectivity to our Firewall using the ping utility. After this, we will access the SonicWall Firewall GUI using its X1 (WAN) IP address.

Note: You can disable the MGMT access on X1 (WAN) Interface!

Step 7: Last Step (What to do the Next!)

In the previous step, we accessed the Firewall GUI on a web browser. However, we need to do the rest of the parts. If you learning the SonicWall Firewall, you just need to complete the licensing part. Also, you can change the X0 default IP address i.e. You can also configure DMZ and Other zones.

Related Articles


Gns3 Sonicwall


In this article, we have discussed how we can deploy the SonicWall Virtual Firewall in the VMWare workstation. It is required that you have a minimum of 4 GB of RAM and an i5 or i7 processor to deploy SonicWall in VMWare. If you have any difficulties in deploying the firewall in VMware, you can comment in the comment box!

Did you found this article helpful? Please comment your views in the comment box!

I have spent many hours reading various blog posts and articles in my quest to get the Cisco ASA working in GNS3. Not just working but to a point where it runs stable, be able to save the running configuration, save the project in GNS3 and then reopen it all back up and for the configuration to be there working.

Here are the steps I have successfully used to get the Cisco ASA working correctly in GNS3. For this example I will be assuming you have already added the ASA and a workstation like XP to GNS3 in order to access the ASDM. We will just be working very simply with a single ASA and an virtual XP machine directly connected, as below.


Install the latest version of GNS3 at this time I was using ‘GNS3-1.3.8-all-in-one.exe

Setup your XP machine and import it into GNS3

IPSec VPN Between Cisco ASA and Palo Alto Firewall

ASA files you will need:




Extra Files for the XP machine.



First we need to create a flash drive for our ASA, we can do this with qemu-img.exe as below:

Now to configure the Qemu options, I use the below options:

Use 512MB and make sure the Qemu binary is set to use the latest exe:

Browse and select the FLASH file previously created.

Untick the ‘Legacy networking mode’

I have had various instability issues with ‘Active CPU throttling’ ticked, at times the console has hung, so if you find this happens to you untick this.

You will have already added the initial RAM disk and Kernel image when added the ASA to GNS3.

Set the Kernel command line to:

ide_generic.probe_mask=0x01 ide_core.chs=0.0:980,16,32 auto nousb console=ttyS0,9600 bigphysarea=65536 ide1=noprobe no-hlt

Set the ‘Additional Settings – Options’:

-vnc none -vga none -m 1024 -icount auto -hdachs 980,16,32

Make sure you apply the changes!

Apply these changes on the first start up!

When you start the ASA apply these changes first:

After the second boot sequence you can start making configuration changes.
Save your Project in GNS3 at this point.

Initial Configuration

Gns3 Sonicwall Vs

Here is some initial configuration to get the ASA up and running.

Once the ASA is up check connectivity between it and the XP machine with a ping.

Copying ASDM to the ASA

We now need to copy the ASDM image to the ASA. For this you will need to have the ASDM image on the XP machine and installed a simple TFTP Server such as SolarWinds-TFTP-Server.exe.

This should now be copying over the ASDM image.

Always use ‘copy running config startup config’ command to save configuration.

Gns3 Sonicwall User

Disk Issues

Fortigate Vm Image Download

I have encountered disk/flash issues occasionally when saving the running config, Cisco has a built in file check utility to fix these type of issues called the fsck utility. This does automatically run when you boot up the ASA however to manually run it run the following: