This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Unable to connect to a static route through my VPN

Hi All,

One of my clients have a XG firewall with SSL VPN(Remote) setup on it. When connected to the VPN I can access the entire network with no issue.

They then have a system on the network that connects them to another IP range to access their software. This device is plugged into the switch on the network and we have to add that route with a cmd command on every PC on the network to access the software. We added the static route on the firewall but the connection is too unstable then.

What I want to know is, how do we setup the firewall to route the traffic to the external device while we are connected to the VPN?

Port1: WAN(200.244.x.x.)

Port3: LAN(192.168.x.x)

VPN(10.x.x.254)

Static Route(10.168.197.x) not connected to the firewall

Please assist



This thread was automatically locked due to age.
Parents
  • Hi Jean-Pierrre, I had something similar to this also this week. I needed normal internet traffic to go out on the remote users internet connection, and to route specific traffic over the VPN to our internal network.

    To do this, I had to tell the XG what traffic I wanted routing internally.

    so VPN > SSL VPN > open the profile > scroll down to Tunnel Access. 

    I added a permitted Network  - (you'd add in here the (10.168.197.x range)

    once you add this in, it will automatically add the routes to the users PCs. 

    I take it your firewall already knows how to deal with this 10.168 range on your LAN so it knows where to forward the traffic?

Reply
  • Hi Jean-Pierrre, I had something similar to this also this week. I needed normal internet traffic to go out on the remote users internet connection, and to route specific traffic over the VPN to our internal network.

    To do this, I had to tell the XG what traffic I wanted routing internally.

    so VPN > SSL VPN > open the profile > scroll down to Tunnel Access. 

    I added a permitted Network  - (you'd add in here the (10.168.197.x range)

    once you add this in, it will automatically add the routes to the users PCs. 

    I take it your firewall already knows how to deal with this 10.168 range on your LAN so it knows where to forward the traffic?

Children
No Data