Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Firewall Traffic gets routed in full-tunnel IPsec VPN

hi there,

since we upgraded our XG to 18.0.4 we have an issue with the traffic (e.g. DNS / icmp) originated from the firewall itself.

We have a full-tunnel IPsec VPN configured for all client subnets to our data center and it seems that routing for the firewall itself is broken now.

SG230_WP02_SFOS 18.0.4 MR-4# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
^C
--- 8.8.8.8 ping statistics ---
10 packets transmitted, 0 packets received, 100% packet loss

------------

SG230_WP02_SFOS 18.0.4 MR-4# traceroute 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 46 byte packets
1 x.x.x.x (IP of Remote VPN-Gateway) 11.644 ms * *
2 * * *
3 * x.x.x.x (IP of Remote VPN-Gateway) 11.576 ms 37.854 ms

------------

SG230_WP02_SFOS 18.0.4 MR-4# nslookup www.google.de
;; connection timed out; no servers could be reached

------------

I know there is a KB article (Sophos XG Firewall: How to Route Sophos Firewall Initiated Traffic Through an IPSec VPN tunnel), but my issue is the exact opposit.
i do not have any rules like described configured.
------------

edit: Output of route lookup:

Route lookup Result
8.8.8.8 is located on the ipsec0
8.8.8.8 is not behind a router.

------------

Anybody had similar issues or any idea how to solve this?

Thanks



This thread was automatically locked due to age.
Parents Reply Children
  • Do you use NAT on the IPSec setup? The Checkbox? 

    PS: What is the issue, if you wants to use the IPsec Tunnel for everything? I mean, if Security is done on the peer site, you can also give the DNS etc. to them? 

  • not checked

    sure i could allow the XG traffic on the peer side - that would be the easy way.

    but i don't get why an update of the firewall changes the routing in a way that all my security policies on the peer side need to be edited.

    and i would expect the XG firewall system to be configurable in the way i want it... and since is was working before in that way, i would rather find the cause of the issue and solve it

  • Basically there were couple fixes of certain behaviors and fixed issues. Some of them caused some weird behavior. And i assume, you saw this in the old version. Now it is doing exactly what the firewall should do. Send everything to the peer end. 

    To change this, its not that easy, as its system generated traffic. System generated traffic is a special use case in Firewall business. The firewall can apply Sd-WAN PBR rules to it. But as you use ANY, it would overwrite your VPN rule and would destroy your deployment. 

    I cannot think of a valid configuration yet for your setup. The use case is not valid right now, because why would you want to use the local breakout for DNS and request everything to the peer end? 

  • i think the problem is more that the firewall is not using its WAN interface IP as source. I don't know what the source was in the previous version tbh.

    Otherwise i guess i wouldn't be able to connect to the WAN interface for management (i am doing this right now all the time) if default routing for the whole system would really be the ipsec route.

    any chance we can change the source interface for the "system-generated" traffic?

    i already tried with the "sys-nat-traffic" rules for explicitly the 8.8.8.8 as destination - no luck
    i also tried PBR rules - no luck (not sure if the configuration was correct:

  • You cannot manipulate the system generated traffic that easy. See: https://support.sophos.com/support/s/article/KB-000035607?language=en_US Thats the only switch to manipulate this. 

  • i tried this - not working

    maybe this is somehting which Sophos should figure out or fix. seems really like an issue in combination with full tunnel VPNs...

    To come to an end i'll reconfigure the peer side to allow the XG traffic via the tunnel as a workaround for now.

    thanks for the support and