This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Zone <-> VPN Routing - XG Firewall

Hi everyone,

I recently switched over to XG Firewall from pfSense, thus kindly excuse my insufficient knowledge.

For a testing setup I have virtualized XG on ESXi.

My plan is to connect using a SSL VPN session to the manage zone, which is the only one which allows SSH traffic.

XG has multiple NICs and zones, listed below:

NIC - ZONE - IP

NIC1 - WAN -> upstream DHCP IP

NIC2 - manage - 10.1.1.0/24, XG acting as DHCP server

NIC3 - update - 10.1.2.0, XG acting as DHCP server

NIC4 - LAN - 10.1.3.0, XG acting as DHCP server

I have followed the online guide to setup a SSL VPN tunnel, the client successfully connects to the XG.
The VPN clients have a remote subnet of 192.168.0.0/24 and a local subnet of 10.10.0.0

Using the Firewall rules, I have enabled access from

Source
Zone:VPN
Network: remote subnet

to

Destination
Zone: LAN
Network: local subnet

as described in the tutorial. Further I have allowed access

Source
Zone:LAN
Network: local subnet

to

Destination
Zone: LAN, manage
Network: Any


Thus, if I'm not mistaken, the VPN client connecting should hop from 192.168.0.x via 10.10.0.x to 10.1.1.x to access resources in the manage zone.
However the client fails to ping either 192.168.0.1, 10.10.0.1 or any machine in the manage subnet.
As I'm using a split VPN tunnel, I manually set the gateway on the local vpn user interface to 192.168.0.1

Would greatly appreciate any help, have been cracking my head about this issue for the past 2 days; apart from the issue described XG is a really nice appliance.



This thread was automatically locked due to age.
Parents Reply Children