I am deploying an XG fireall to replace our existing UTM firewall which is being moved to another location. Our corporate IT LAN network is behind the XG firewall with about 20 client networks which connect via IPSEC site to site VPNs. From the corporate IT LAN we can access all client networks on the other side of the IPSEC tunnels.
We also utilize an SSL VPN to remote into the IT network when we need to provide support to the remote clients.
The problem I am having is when I am connected via the SSL VPN, I cannot route to the client networks. Now I know the problem. The IPSEC configurations do not include the SSL VPN subnets and therefore are not routable. I could fix this by going through and reconfiguring each IPSEC tunnel to include the SSL VPN subnet, but that seems like a lot of work when Source NAT could easily solve my problem. In fact, we have been running source NAT on the UTM configuration for years and it has worked great. I just can't figure out how to do this on the XG.
Essentially, I need an SSL VPN client to be masked (SNAT) as an IP on the LAN IT network since all remote client networks already know how to route back to the LAN IT network.
Does anyone have any input on how this might be accomplished?
LAN IT (10.255.255.0/24)
SSL VPN (10.242.2.0/24)
Sample Remote Client Network (10.2.48.0/24)
Hope this makes sense.
This thread was automatically locked due to age.