Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL-VPN

Hi,

Say I am using SSL-VPN on my home PC. After connecting to SSL-VPN and if I check in Browser "ShowmyIP", then which IP should I get. Should I get my home PC ISP IP or IP to whom I have connected my SSL-VPN i.e. my Office ISP IP ?

Please help me to understand.

Manish



This thread was automatically locked due to age.
Parents Reply Children
  • The website is owned by our client so binding the IP of the website to Split Tunnel is not possible since it is his asset.

    Yes as far as default gateway is concerned I think that is in our hands.

    Thanks

  • Hi : " bind the IP of this website to Split Tunnel" in the last comment - means you may add the Website Public IP in the accessible resources in SSL VPN. Due to this with the split tunnel as well when end-user connect SSL VPN traffic for that IP will come to firewall from end-user machine and on Firewall with VPN to WAN Rule and with required NAT action that website traffic will be allowed. (f Cx has multiple ISP on the XG side then may require the SD-WAN rule as well as per requirement).

  • I think whole think has now incorrect info. Client is having a website to which our office public IP is binded so that no one else can access the website except us. Now let me know how to make understand your above statement ?

  • Hi  Let us assume the below scenario:

    Client website xyz.com hosted on outside IP x.x.x.x

    Now they have allowed traffic for your office IP y.y.y.y and this y.y.y.y is terminated on XG and SSL VPN Is configured on this XG. In the SSL VPN accessible resources, you will add x.x.x.x IP with your XG LAN Network which you would like to allow to end-users once they connect to SSL VPN.

    Due to these settings on XG SSL VPN, once the end-user connects SSL VPN with a split tunnel end system has a route for x.x.x.x IP( for client website xyz.com) over SSL VPN and traffic will come to XG when they will Browse it from a machine. Here as a source of the request is SSL VPN, it will be from source zone VPN and destination x.x.x.x are outside XG over WAN cloud - destination zone is WAN zone and to allow this traffic VPN to WAN rule with required NAT action.

    Note: You may test it in your local setup for any website like fliplart.com for which you want to route traffic via XG with a split tunnel in place of the end-users actual ISP.