Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Help with dual WAN config and second router

Dear community-

I have a scenario I would like to achieve with XG330 and a Synology router.

Background story: We have a small office setup with a Synology router, that handles our WAN, LAN, Wifi and VPN (IPSec to GCP as well as L2TP for road warriors). As the internet connection is not stable we have also gotten a lease line. To terminate that we have repurposed one of our pre-covid equipment, a XG330, to terminate the lease line on a fiber port.

Long story short, both WAN lines should act in parallel or in failover config, but the Synology router only has a single WAN port. Hence thought to turn that into an Wifi AP and go with the XG330, but the XG330 is throwing all sorts of problems with applying IPSec policies (another issue I raised at community.sophos.com/.../custom-ipsec-policy-not-accepted-for-l2tp

Thus back to square one and considering the following scenario:

  • Terminate both WAN on the XG330
  • Setup a DMZ on the XG330
  • Put the Synology into the DMZ
  • Route all incoming and outgoing traffic through the DMZ to the Synology
  • Continue using the Synology the same way it is currently set up, just use the XG330 as a Gateway for the Synology, which handles both WAN connections

Not sure whether that is a wise or ideal setup. If the problems with the XG330 L2TP would be solvable, I think its a no brainer to shift everything. But for now I have no other option I guess. Alternative I was thinking to bridge both WAN ports on the XG330 to the Synology. But wont work as I can only assign 1 IP to the WAN port of the Synology. Hence the idea to have the above scenario.

Questions:

  • is that possible?
  • if so, how best done and configured on XG330?
  • if not, what else would you suggest?

Drawing also at docs.google.com/.../edit

Thanks for any help or guidance you can give!!

Best -Alex



This thread was automatically locked due to age.
Parents
  • I looked at this post and looked at your post about L2TP. I presume you want to avoid setting up your users with a new VPN setup (as the XG won't support your current configuration).

    If I was in your shoes, I would bite the bullet and replace your VPN solution rather than try and get the above to work and then maintain it. I don't know how many VPN users you have, that may be the show stopper for you.

    From my limited experience, the SSL VPN seems the best supported on the Sophos but others may want to disagree with that.

  • Thanks, JasP- You were absolutely right. I mastered the Sophos setup and am now running on dual WAN with dual VPN to our VPC as well as remote access for our road warriors. I ditched L2TP and switched over to Remote SSL VPN along with the IPSec S2S tunnels. Last part was to get all Remote VPN users routed (SNAT) correctly to the local LAN as well as the VPC, including correct DNS resolution with the help of our local DNS server.

    SSL VPN indeed seems to work best. I previously ignored it as it meant to use extra clients for most of the operation systems we have in use; hence extra maintenance overhead while all the OS would have on board L2TP support one way or another. Nevertheless SSL VPN clients worked out of the box with WIN10 and MacOS setups. Just Linux is a bit more tricky in terms of binding our local DNS in a split tunnel setup. That seems to require a small script to modify `systemd-resolved` as well as the routing table when the tunnel is brought up. Currently investigating ...

  • Glad I was able to help and thanks for the feedback. Unfortunately I'm not a Linux person so I have no suggestions for resolving your final issue.

Reply Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?