This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Ambiguity in manual for SD-WAN policy destination

Manual notes the following, but WAN is not an option.

Check if an SD-WAN policy route has Destination networks set to Any.

Change the setting from Any to a specific choice (example: WAN) from the list. Setting it to Any forces XG Firewall to forward internal traffic also to the WAN interface.

 

This seems like a very easy solution to my problem of all VPN SSL traffic appearing to try routing out the WAN interface.

I am using OSPF routing for the network, and precedence is sd-wan. vpn, static, and I have no static routes.

Am I missing a workaround to the possible Any/Any issue?



This thread was automatically locked due to age.
Parents Reply Children
  • With the above, I am now getting to one local LAN subnet, where the VPN connection is made, but not across to anything else in the OSPF range.

    I currently have just one other subnet (192.168.20.x) in the allowed resource list of "Permitted network resources", which is back to the head office, but this is not accessible.

    The OpenVPN config is listing:

    remote x.x.x.x 8443 (public interface)
    remote 192.168.10.1 8443 (local lan)
    remote 172.30.255.10 8443 (ospf p2p)
    remote 10.10.1.1 8443 (local ospf area)

  • The firewall rule is allowing the remote subnet.

    A packet capture shows it forwarding the request:

    Just no return.

    Oh, so close. :)

  • Actually, why does the client even send a Packet to 192.168.20.30? This Network is not in the routing table of your split network, isnt it? 

    __________________________________________________________________________________________________________________

  • Ah, now the challenge comes to light. Can I make OSPF available to the client?

    Yes, it is part of the network, but through OSPF. So, it should be accessible to this client.

  • OpenVPN is limited to "It needs a Permitted Network". 

    If you select Tunnel All, this would not be needed.

    If you select Split Tunneling, you need to specify all Permitted Networks within your Network. You could work with /8 Networks

    __________________________________________________________________________________________________________________

  • Shouldn't the "Tunnel Access *" section (GUI) provide this, as I have the 192.168.20.0/24 network listed?

    I had tried a /16 and went back to just keeping the testing focused to one additional location.

  • I have another question, if the Client is actually seeing the traffic by the SSLVPN Client and you are talking about "Routing" (OSPF), is there a route for the other devices to use the IP Segment of SSLVPN? 

    Could you check the OSPF Settings, if your 10. SSLVPN Configuration is actually published to other devices? 

    Maybe the route back to XG is missing, hence the destination server gets the ping, but does not know how to answer. 

    __________________________________________________________________________________________________________________

  • All the remotes have the following:

  • LuCar,

    I think you nailed it.

    This is from .20 side (I'm sure somebody is getting my packets).

    Any idea how I get them back?

    Paul

  • LuCar,

    All it took was getting a new range for the remote VPN network, and adding to the OSPF table. 

    I think my initial problems were firewall or sd-wan rule related, so I reverted, and found I didn't need, the "Example: console> system route_precedence set static sdwan_policyroute vpn". Just in case I am missing something related to this, please nudge me back to your suggestion.

    Thank you maestro, for your time and patience.

    Paul