This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Site-to-Site RED (XG to XG) unable to pass DHCP / connect to remote bridged devices

Goal:

Create a single network between two remote locations accomplished by using two Sophos XG firewalls setup with RED connections using same subnet.

 

Requirements:

The restrictions of the of underlying devices (a DVR and cable Set-top-boxes) on this network require they all be on the same subnet and be able to freely pass/receive any broadcast messages across the subnet so as to discover and communicate with each other.  This needs to occur across the local and remote locations.

 

Problem:

Simply put I have been unable to figure out how to successfully configure a seamless subnetwork where data and any broadcasted data is passed between the local and remote boxes. Known here out as box 1 and box 2

Here is the current setup:

SFXGBox 1 – Verizon

XG Version – 17.5.10 MR-10

Port 1 – 192.168.1.x
Port 2 – Verizon (WAN)
_________________________

Bridge (Br0) – 192.168.100.103 (DHCP setup to serve requests on interface Br0)
     Bridged Interfaces:

  • Port 3 (Physical port)
    • DVR – 192.168.100.112 – (DHCP successful)
    • STB1 – 192.168.100.113 – (DHCP successful)
  • reds1 – Firewall Red Server (online Spectrum IP displayed)

 

SFXGBox 2 – Spectrum

XG Version – 17.5.10 MR-10

Port 1 – 192.168.3.x
Port 2 – Spectrum (WAN)
_________________________

Bridge (Br1) – 192.168.100.115 (received DHCP from Box 1)
     Bridged Interfaces:

  • Port 3 (Physical port)
    • STB2 – 192.168.100.xxx (unable to get DHCP from Box 1)
    • Test PC – 192.168.100.xxx (unable to get DHCP from Box 1)
  • reds1 – Firewall Red Client (online Verizon IP displayed)

 

BOTH XG BOXES HAVE FIREWALL RULES TO ALLOW LAN TO LAN TRAFFIC ANY SERVICES

 

More Info:

Each XG firewall has two independent networks defined under Port 1 on Box 1 & 2, (192.168.1.x & 192.168.3.x respectively) these are self-contained and are currently operating independent of each other and working as designed / expected – No changes needed or wanted here.

The common network I am attempting to create (192.168.100.x) between the two Sophos XG boxes is utilizing a RED site to site tunnel.  I have successfully created the tunnel on each box (using Red Server / Red Client method) and they both show online; displaying the others WAN IP.  

On Box 1, I have bridged the physical Port 3 and the reds1 (setup as RED SERVER) interfaces to create interface Br0 (both Port 3 and reds1 are in LAN zone) then set the static network as 192.168.100.103 /24, I have also selected “Enable routing on this bridge pair”.

On Box 1, I have setup a DHCP to serve requests on interface Br0 - 192.168.100.103 (to supply IP range 192.168.100.111 – 192.168.100.199 / 24) with DNS as 192.168.100.103

On Box 1, I have connected an external switch to Port 3 (Br0) and plugged in both my DVR and STB.  Both devices successfully obtained an IP from the DCHP on Box 1, have internet access, and are both able to communicate with each other.

Here begins my problem

On Box 2, sticking with the same methodology, I have bridged Port 3 and reds1 (setup as RED CLIENT) interfaces to create interface Br1. (both Port 3 and reds1 are in LAN zone). Here instead of static network I choose DHCP, I have also selected “Enable routing on this bridge pair”.

On Box 2, the new bridge successfully receives an IP from DHCP on Box 1 and set as 192.168.100.115. (So here I can tell I have some communication between the two boxes but that is where it ends).  I added another switch to physical Port 3 on box 2 and connected both the 2nd STB as well as a TEST PC to ensure the connection was working. Ignoring the 2nd STB at this point I’ve focused on the TEST PC to ensure I can get the basic network to function.

On Box 2, I attempted to pull an IP from the TEST PC connected to Port 3 on its bridged interface, I assumed it would work.  I assumed wrong. I am getting no response from the DHCP on box 1. 

Apart from playing around with different combinations of settings (completely stabbing in the dark). I seeking any assistance in how to get this setup to work.  Maybe I’m on the right track or completely off course? 

Noting: I have successfully followed the Sophos directions on how to setup an XG to XG RED but it was more aimed at connecting two different subnet. Which is not exactly what is needed here.

I am including a diagram of my current setup.  The bit in the green box is what I am trying to create.  The bit in the red box is the part that does not work.



This thread was automatically locked due to age.
  • I am very sure, something went wrong between Port3 and your Client. 

     

    Tcpdump on Port level is actually the packet leaving the interface. Therefore this packet actually left Port3. But it does not hit the Client. 

    If you investigate the communication path between Port3 and your Client, can you see something blocking or rerouting the traffic? 

  • Just wanted to share, that I was finally able to figure this out and I have it working correctly!

    Apparently, I hadn't found it necessary to share that I run Sophos in a virtualized environment as I have never run into any problems with the operation and expected results of Sophos(until now).

    So all this maddening mess was caused by a simple check box in Hyper-V under the network settings to Enable MAC address spoofing.  After I had checked the box and re-launched the Sophos virtual machine, everything lit up like a Christmas tree and began working. SMH.   I can't believe something so innocuous could cause such a headache!

    Thank you again for all your suggestions appreciate all the support you provided.

  • Hi,

    I have the same configuration on my BO and HQ...

     

    But, when the BO device goes on Internet use the BO connection (public IP)

    How can I set to goes on Internet by HQ connection?

     

    Thanks

  • Hi cyberguy,

    If I'm understanding your question correctly, you are experiencing all internet traffic from your BO being routed out through the BO's ISP instead of being routed through your RED site-to-site and then ultimately out through your HQ ISP connection.

    If so, this can be remediated fairly quickly. Unfortunately, you've not provided much detail to go off of so this guidance will be bereft and based on assumption. 

    Assuming you've created a separate ZONE for the RED Site-to-Site on both the client and server(If not, I'd recommend to do so).

    You should simply need to configure firewall rules on both the client and server side as follows.

    • On your client side create an outbound rule to set Source and Destination zones to match the ZONE you created and setup for your RED client,  Source networks, destination networks, & services should be populated with ANY
    • One your server side locate and edit your rule that allows HQ internet traffic to pass externally(or create a new one).  In your Source Zones, add the ZONE you setup for your red connection and save.

    All BO traffic will now be routed through the RED site-to-site connection, subsequently all internet traffic will pass out though your HQ ISP (BO & HQ)

    Obviously, this is a the quick and dirty way to obtain your goal and likely many other best practices exist.  Hopefully this gives some guidance or ideas on your specific situation.