This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

VPN timeout/key negotion after 8 hours

Hello,

 

I have a remote user using SSL vpn connect to our main office Sophos XG virtual appliance. After almost exactly 8 hours it seems that the VPN is re-negotiating keys but fails and the VPN connection dies. This is probably because we are using 2 factor authentication?

 

Is there a way to adjust or disable the re-negotiation of the keys so that this will not happen?

 

Regards

Jacob 



This thread was automatically locked due to age.
Parents Reply Children
  • Thats a nice answer by a staff of sophos...

  • This thread is 3 Pages with content in different direction. Discuss UTM matters in this thread those not help to have a overview. 

    Especially i do not know:

    Do you use Sophos Connect or OpenVPN or the Sophos OpenVPN Client? 

    Do you use AD, Local AD or Radius as a Backend Authentication?

    Do you mean by Session Timeout the Key Lifetime or the User Session by Data with IDLE? 

     

    This questions should be handled by the UTM Section, because the admins there can actually answer all of those questions in a proper manner. I am not having a UTM to interact and verify my answer for UTM. (PS: i could give you a guess, but that is not helpful at all). 

  • Hi LuCar Toni,

    My Product is: XG 310, FW 17.5.MR8

    I use Sophos SSL VPN Client. Authentication via AD. SSL VPN users are using the AD account and combine it with OTP to authentication. 

    In the VPN global setting, the default value of Key lifetime is 28800 mean 8 hours.

    Recently, Users report me that their VPN connection always drops the connection exactly 8 hours later. So I think there is something went wrong between key lifetime and OTP.

    Seem this issue only affects when using OTP :) 

     

    Below is my testing after increasing the Key lifetime to 16hrs :), as you can see that the start time and end time exactly 16hrs. Another note, I still keep the "Maximum session timeout" as default. 

  • XG will actually reauth the user after rekey. That is the current design, which is currently under revisit to change. 

    IPsec will rekey after 4 hours. (Coded)

    SSLVPN will rekey after 8 hours. (Adjustable)

     

    That leads to 1-3 OTP Auths per Day in a common scenario, which is annoying but "maybe ok". 

     

    Assuming you will get the same numbers in Sophos Connect 2.0 ? Could you give this a try? 

    https://community.sophos.com/products/xg-firewall/sfos-eap/sophos-connect-eap/b/announcements/posts/sophos-connect-2-0-early-access

     

     

     

  • LuCar Toni said:

     

    That leads to 1-3 OTP Auths per Day in a common scenario, which is annoying but "maybe ok". 

     Assuming you will get the same numbers in Sophos Connect 2.0 ? Could you give this a try? 

    https://community.sophos.com/products/xg-firewall/sfos-eap/sophos-connect-eap/b/announcements/posts/sophos-connect-2-0-early-access

     

     

    That is a bad joke, isn't it? You can't explain you colleagues or even your CEO that he have to reauthenticate just a few times a day, because it's hard coded at the firewall? 

    In times of corona where everyone is reliant to have a stable internet connection. What about Online Meetings, phone calls, file uploads etc. ? "uhm sorry, I have to reauthenticate my vpn client b'cause sophos can't offer an option to adjust the rekey / auth time.  

     

    Yes we could use Sophos Connect 2.0 but only because its was released a few days ago and is still in beta? 

    Anyway what about MacOS Users? 

    I asked the same questions in the Sophos Connect Group, but the only answer is " yeah is at the roadmap". 

     

    Sorry, I really appreciate your support. But this almost the same useless answer which I was get from the regular sophos support as I described before. 

    Sophos should really fix this basic issues! 

  • I could not agree more. Sophos Support is getting more and more worrying. Statments like that are totally not acceptable.
    How can it be that its August and still no solution on a simple issue like this?