Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

When data passes over our VPN tunnel, any outside users get cut off

We have a VPN tunnel configured to pass our labs through to a lab company, the tunnel is bidirectional. It's purpose is to go from one host to our one host and back. It is set up with NATing as well.

I believe the tunnel is set up correctly and it is supposed to only communicate back to our Database/DC at 192.168.1.5

We have a terminal server at 192.168.1.2, which most of the user on the internal LAN network remote into to do work in the applications.

We have configured Remote Access SSL through the VPN client for our staff to work from home, in which they connect to the VPN, then RDP into the terminal server (.2). I also have Team Viewer set up on the Terminal server/Database(dc)/XRAY/a few other computers.

The tunnel is fine but during the day, when labs pass through, all of a sudden connectivity for anyone on the Remote Access is lost to the terminal server. I also lose all my team viewer hosts, except the database server. Users can also RDP to the database server while in the VPN client, but you can't even ping the terminal server. Internally (behind the LAN), everything is working fine and no one notices anything. Outside of the internal network, everyone gets disconnected.

I am not sure if this is a tunneling issue or a firewall policy issue, could someone assist me please?

I should also add that connectivity is down permanently, until I bounce the tunnel.


Thank you!



This thread was automatically locked due to age.
Parents Reply
  • At this point, I am not even sure the VPN tunnel has been configured correctly. I checked the logs as you showed me and there really isn't anymore traffic spikes.

     

    I have:

    Outside company VPN Out

    Source

    Source Zones - LAN

    Source Networks & devices - DB1, DB1-Inside-Global-4-Outsidecompany (I believe the global is the NATed address of my DB server)

    Schedule - All the Time

    Destination & Services

    Destination Zones - VPN

    Destinate Networks - Outside Company (The NATed host on their end)

    Services: TCP-55443, TCP-59536

    Advanced

    Traffic Shaping Policy - Extremely Limited

    --------------

    Outside Company VPN Access

    Source

    Source Zones - VPN

    Source Network & Devices - Outside company (the NATed host on their end)

    Schedule - All the time

    Destination & services

    Destination zones - LAN

    Destination Networks - DB1, DB1-Inside-Global-4-Outsidecompany (I believe the global is the NATed address of my DB server)

    Services: TCP-55443, TCP-59536

    Advanced

    Traffic Shaping Policy - Extremely Limited

Children
No Data