This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Windows AD at AWS and On-Premise XG

Hi,

 

My enviroment:

 

XG Cluster On-Premise and IPsec tunnel to AWS where is located AD. Local XG console can ping DC but can not telnet to 389 or 636.

 

XG IP: 192.168.157.70

DC 172.30.0.103

 

I added thos rule:

onsole> show advanced-firewall                                                 
        Strict Policy                           : on                            
        FtpBounce Prevention                    : control                       
        Tcp Conn. Establishment Idle Timeout    : 10800                         
        UDP Timeout Stream                      : 60                            
        Fragmented Traffic Policy               : allow                         
        Midstream Connection Pickup             : off                           
        TCP Seq Checking                        : on                            
        TCP Window Scaling                      : on                            
        TCP Appropriate Byte Count              : on                            
        TCP Selective Acknowledgements          : on                            
        TCP Forward RTO-Recovery[F-RTO]         : off                           
        TCP TIMESTAMPS                          : off                           
        Strict ICMP Tracking                    : off                           
        ICMP Error Message                      : allow                         
        IPv6 Unknown Extension Header           : deny                          
                                                                                
                                                                                
        Bypass Stateful Firewall                                                
        ------------------------                                                
         Source              Genmask             Destination         Genmask    
                                                                                
                                                                                
        NAT policy for system originated traffic                                
        ---------------------                                                   
        Destination Network     Destination Netmask     Interface       SNAT IP 
        172.30.0.103            255.255.255.0                           192.168.
157.70                                                                          
        172.30.0.103            255.255.255.255                         192.168.
157.70                                                                          

First question. NAT policy twice? how to delete one.

 

And also followed this link : https://community.sophos.com/kb/en-us/123334

 

But still having problems. AWS tunnel is UP all allk ports allowed

 

Any idea?

 

Regards



This thread was automatically locked due to age.
Parents
  • You can delete this rule with set advanced-firewall cr-traffic-nat del destination <Destination IP/Network> snatip <NATed IP>

     

    If ping is possible, could be a Firewall issue. Did you check both appliances via tcpdump? You wont see the outgoing traffic but incoming.

    https://community.sophos.com/products/community-chat/f/knowledge-base-article-suggestions/105811/how-to-tcpdump-on-xg

    __________________________________________________________________________________________________________________

  • HI,

     

    17.1.1 MR-1# tcpdump -ni any host 172.30.0.103 and port 636     
    tcpdump: Starting Packet Dump                                                   
    23:42:33.483198 lo, IN: IP 172.30.0.103.636 > 169.254.234.5.51841: Flags [R.], s
    eq 0, ack 2466481052, win 0, length 0                                           
    23:43:38.925909 lo, IN: IP 172.30.0.103.636 > 169.254.234.5.51912: Flags [R.], s
    eq 0, ack 2925865509, win 0, length 0   
  • i am confused. 

    Can you explain your network, the ipsec tunnel, the ips etc? Where did you perform this dump? 

    __________________________________________________________________________________________________________________

  • Hi,

     

     

    This tcpdump was donde from XG device. 172.30.0.103 is DC... and 169..... I think is the ipsec local IP

  • Still confused. Which XG? As mention before, i except you have 2 XGs? 

    172.30.0.103 is the AD in AWS. So you perform a access from XG on prem to AD AWS through XG in AWS? 

    As far as i can tell from this little information, the NAT is not correct.

    your AD Server is refusing the packets because it is a link local address, not a IPsec Address out of the tunnel. 

    You used 

    172.30.0.103            255.255.255.0                           192.168.157.70           

    What is 192.168.157.70? Is this address public for the AD?                                               

    __________________________________________________________________________________________________________________

Reply
  • Still confused. Which XG? As mention before, i except you have 2 XGs? 

    172.30.0.103 is the AD in AWS. So you perform a access from XG on prem to AD AWS through XG in AWS? 

    As far as i can tell from this little information, the NAT is not correct.

    your AD Server is refusing the packets because it is a link local address, not a IPsec Address out of the tunnel. 

    You used 

    172.30.0.103            255.255.255.0                           192.168.157.70           

    What is 192.168.157.70? Is this address public for the AD?                                               

    __________________________________________________________________________________________________________________

Children