This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Connect to other end of IPSEC connection by SSL remote access users

I'm afraid this question has already been asked but I couldn't find it for XG. I did find it multiple times for UTM but that unfortunately doesn't bring me to a solution.

I have to sites, A and B interconnected by a IPSEC VPN connection. Traffic is flowing as expected and everything works fine.

Connected to site A I have SSL VPN remote access clients that can communicate to site A without problem. So far everything is fine.

Now I want to allow remote SSL clients from site A to communicate to site B and it has to be done with a SNAT rule since the other side doesn't want to add the SSL subnet to the tunnel. So basically the remote SSL traffic should be source natted to a site A's local address before being sent to site B.

I made a drawing of the situation:

I made the following firewall rule:

The corresponding NAT rule is the following:

The Translated source (SNAT) address is 172.16.16.250 which is inside the LAN-network of site A.
The SSL VPN Network is: 10.81.234.0/24

VPN config looks like this:

I can "see" the traffic on the XG en it seems that it is being sent to the correct location (however it uses Port2 as Out interface where I expect it should be ipsec0 so this might be the real problem....

The upper line works and is traffic from the SSL client to the network at Site A. The lower line doesn't get a reply back (it uses Port2 to send the packet out and might need to be ipsec0 interface).

I must be miissing something most likely how to make sure the traffic from the remote access vpn client uses ipsec0 as outgoing interface instead of Port2, but I can't seem to find how to configure this.

Can anyone help me on this one?



This thread was automatically locked due to age.
Parents
  • FormerMember
    +1 FormerMember

    Hi ,

    Thank you for reaching out to the Community! 

    It seems you are missing VPN to VPN firewall rule on firewall A. 

    When SSL remote VPN users connect to firewall A, the source zone would be VPN, and if the SSL VPN users need to connect to firewall B, which is connected to firewall A over IPSec site to site, then the destination zone would be VPN. 

    I would also suggest you remove "Any" and add an appropriate zone in the firewall rule VPN to Any zone.

    Check out the following KBA for more info: Allow Remote Access SSL VPN Traffic Over an Existing IPsec Tunnel without Modifying the IPsec Tunnel in Sophos XG Firewall.

    Thanks,

  • Hi H_Patel,

    Seems I needed to add the ipsec_route from the console, which is the last step of the KBA. After doing this my remote access client can access the resources at site B.

    However..... Now the XG firewall itself cannot access the resources anymore behind the VPN-tunnel. I noticed this because my remote worker couldn't authenticate anymore and the XG couldn't reach the AD server anymore which is located at Site B.

    There are multiple networks inside the tunnel between site A and B, when I don't create the ipsec_route for the subnet where the AD-server is, the VPN user can still be authenticated (and the firewall can ping the AD server), but the SSL user cannot (because the ipsec_route is missing).

    While the local computers at site A can still access all resources at site B both with or without the ipsec_route, the firewall cannot access them with this rule, the SSL client cannot access them without....  

    Is this something that can also be solved somehow?

Reply
  • Hi H_Patel,

    Seems I needed to add the ipsec_route from the console, which is the last step of the KBA. After doing this my remote access client can access the resources at site B.

    However..... Now the XG firewall itself cannot access the resources anymore behind the VPN-tunnel. I noticed this because my remote worker couldn't authenticate anymore and the XG couldn't reach the AD server anymore which is located at Site B.

    There are multiple networks inside the tunnel between site A and B, when I don't create the ipsec_route for the subnet where the AD-server is, the VPN user can still be authenticated (and the firewall can ping the AD server), but the SSL user cannot (because the ipsec_route is missing).

    While the local computers at site A can still access all resources at site B both with or without the ipsec_route, the firewall cannot access them with this rule, the SSL client cannot access them without....  

    Is this something that can also be solved somehow?

Children