Hi all,
Today, i see the KB in community,
https://community.sophos.com/kb/en-us/123334
But i don't know which case will use this KB.
Any Ideal?
This thread was automatically locked due to age.
Hi all,
Today, i see the KB in community,
https://community.sophos.com/kb/en-us/123334
But i don't know which case will use this KB.
Any Ideal?
Why do we have to Route and NAT of the VPN traffic although these traffic naturally have to be encapsulated in IPSec Payload ???
Don't get the idea of this KB.
Mikel,
Its quite simple.
Network A is on your Local Site.
Network B on your Remote Site.
XG build a SA between Network A and Network B in IPsec. So the route Exist between both.
But - XG itself does not know the route.
So you have to manually add this route to tell XG "system originated Traffic" like Authentication, Email etc.
Hi Lucar,
It's actually a bit more complex than that and the reason this KB exists is because the XG does not actually apply IPSEC routing to it's own initiated traffic.
The reason for this is because the IPSEC routing is post the processing phase and before passover to the Routing phase (in my own terms). So therefore traffic that is pass through the XG will be compared to requirements to be passed through the IPSEC tunnel but because the XG traffic is sent directly from its interfaces it really only compares it traffic against the standard routing table of which the IPSEC routing is not entered within it (do a route print in the CLI and it does not exist there).
So therefore we have to tell the XG system itself to use the IPSEC tunnel for traffic targeting a specifc IP/range and then because the IPSEC tunnels are bound to the "WAN" interface, to prevent it using the WAN IP we have to tell it to NAT itself for communications against those match conditions for those targets. And to make sure it sits appropriately within the SA.
It is odd and makes not too much sense but there is a reason behind it but I cannot remember off the top of my head. It was a design decision left over from Cyberoam. I believe this will change in v18 because to allow Route Based VPNs and SD-WAN type functionality I would expect the IPSEC routes to have to exist in the main kernel routing table.
Emile
Thanks bro,
I got the idea now.
According to the
https://community.sophos.com/kb/en-us/123156
In this case, when the BO Firewall doesn't have user information about the LAN Branch Office's PC, it will query the AD Server in HO --> This traffic isn't included in the original configured ACL of the IPSec connection (because it originates from the BO firewall itself) ==> So we need to configure ROUTE and NAT for this firewall self-originated query traffic :)
Brgs
Hi Emile,
do i get the idea right in this case ???
According to the
https://community.sophos.com/kb/en-us/123156
In this case, when the BO Firewall doesn't have user information about the LAN Branch Office's PC, it will query the AD Server in HO --> This traffic isn't included in the original configured ACL of the IPSec connection (because it originates from the BO firewall itself) ==> So we need to configure ROUTE and NAT for this firewall self-originated query traffic :)
Brs
"...So we need to configure ROUTE and NAT for this firewall self-originated query traffic :)"
That's exactly it, because the communications between the XG and STAS are bi-directional, XG > STAS for querying and STAS > XG for live user sync.
Hope that makes sense now!
Emile
Thanks bro,
Your explanation is great and very clear !
Mikel
Brs,