This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

cannot complete inbound tcp connections over site-to-site VPN

I've completed site-to-site VPN setup with AWS using transit gateway using Sophos XG firewall.

topology

internal network (10.x.x.x) ------sophos-xg------site-to-site-vpn-AWS--------vpn-gw-----transit-gateway-----vpc (172.31.0.0/16)

 

what works:

- ping from internal network to vpc and ping from vpc to internal network

- outbound tcp session to AWS VPC

- traceroute from internal network to vpc

 

what doesn't work:

- traceroute from vpc to internal network

- AWS VPC tcp inbound connection into internal network

 

For the inbound TCP connection (test to port 9999), I can see the VPC on 172.31.x.x packet reaching the firewall on WAN interface 218.x.x.x. Internal network is 10.x.x.x ip address.

 

is DNAT rule required to make this work? I tried playing with it but haven't got it to work either.

Thanks.

 


This thread was automatically locked due to age.
Parents Reply Children
  • Hi  

    How many SAs do you have configured in your ipsec policy on the XG?

    On v17.x/v16.x, the XG is a policy based IPsec device.  AWS only supports a single SA within your tunnel.

    For traceroute problem, you would need to enable IGMP/PING on XG and AWS to allow it.

    Please remember that you will need to create firewall rules.

    Also inside your IPsec networks, you must make sure the far side is included in the configuration otherwise it will not route.

    However I do agree with  that you should utilize v18 and choose the option to use route based VPN.

    Thanks!

  • firewall rules are in place to allow all traffic bi-direction as the first rule.

    AWS confirmed IPSec tunnel was formed correctly after reviewing packet captures.