.Ahoy!
I have a customer who has an XG230. Port 6 (Eth) and Port 7 (Fibre) are bridged. The fibre from the 'leased line' modem is connected to port 7. Another company in their building is connected to port 6. This allows both companies to share the same internet connection, both with their own public IP configurations.
This has worked fine for years...
However, my client is now implement SAP hosted in AWS and there is a requirement for an IPSEC site-site VPN with AWS. I have been following this guide - Sophos XG Firewall v18 to AWS VPN Gateway IPSEC Connection - Recommended Reads - Sophos (XG) Firewall - Sophos Community
My problem is that when I go to select the local interface to listen on (WAN), there are no options to choose from, no interfaces available!
I read somewhere that apparently this is just a Sophos XG limitation and I can't use a bridged interface for an IPSEC site-site VPN?! Is this correct?
If so, I was wondering of a possible workaround...
Can somebody let me know if the following would work?
Can I remove the IPV4 configuration from my bridge (effectively turning my bridge into an unmanaged switch), add another port into the bridge (say eth port 5?) Then setup eth port 4 as my WAN and patch port4 into port5? (Loopback).
This in theory should allow port 5,6 and 7 (2 x eth, 1 x fibre) to be an unmanaged switch with no IP configuration (the same as if I had a separate network switch). Port 4 would be my main WAN and would simply plug into this 'virtual switch' ?
I am trying to avoid having to buy a £200+ switch with SFP port.
Cheers!
This thread was automatically locked due to age.