Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Achieving Domain Controller via SSL VPN is impossible

Hi to all of you.

I have two Sophos XGS 136 in HA (active / passive); the firmware version is SFOS 18.5.3 MR-3-Build408.

IT infrastructure consists on:

  • 1 Windows Server 2019 Host with Hyper-V role
  • n.2 VM Windows Server 2019: both are DC and one of them has file server Role
  • Many Windows 10 Pro clients

All servers (Host and VM) and clients are on the same subnet


I have configured user authentication via active directory on Sophos XG; users access via VPN SSL using them AD credentials and they are able to reach all the devices on the network (PC clients, NAS, networks printers, access point, or the Hyper-V Host server), but not the Domain controllers VM!

On the firewall, Active Directory Server authentication was originally set with "Plaintext" connection security, but in this moment is set with SSL/TLS connection security (and the Test connection works). 

There's no way to reach DCs: ping, rdp session, shares browsing on file server, etc always fail, but If I make the same tests to the Host Server, they perfectly work.

DCs are not reachable also if I try to connect using SSL VPN local user of the Sophos XG

If Host Server and VMs are on the same subnet (10.0.0.0/24), can the problem be a bad traffic rules configuration?

PS: To exclude that it is a Hyper-V problem, I installed a Windows 10 VM on the Hyper-V Host server and It's perfectly reached from SSL VPN user
PPS: Having a Qnap NAS at my disposal, I enabled OpenVPN server on it; in this case SSL VPN (qnap) users can perfectly reach DCs servers. 

Can you help me to solve this big problem? Thanks for your support!



This thread was automatically locked due to age.
  • A quick peek at your "dumpvpncli" pcap shows what I assume would be your DCs at 10.0.0.201 and 10.0.0.202 repeatedly doing an ARP request for 10.81.234.6. This leads me to believe that the traffic from the host at 10.81.234.6 on the SSL VPN is indeed reaching the DC but it appears the DCs do not know how to route back to the 10.81.234.0 network. I wouldn't expect to see an ARP from 10.0.0.201 for 10.81.234.6. Since they arent in the same subnet the proper response would be for the DC to look into its routing table first for the 10.81.234.0 network and then find the next hop and ARP for that IP if it wasnt already in the ARP table. I wonder if your subnet setting on the DC are correct? Is the NIC setup as IP - 10.0.0.201, Subnet 255.255.255.0 and GW 10.0.0.254? Right now the DCs think 10.81.234.6 resides inside its subnet so it doesn't send the traffic to its default gateway (the Sophos). 

  • Thanks, thanks thanks!!! It's incredible, I don't know why, but both the DC servers were using the subnet mask 255.0.0.0 instead of 255.255.255.0! I'm sure that in the past they were using the subnet mask 255.255.255.0, so the only thing I can immagine, is that a NIC driver's update has bring back the subnet mask configuration to the default value for the subnet 10.0.0.0.
    Remember that if you come to Rome, you will be my guest for a nice pizza!

Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?