3.3.5 IN RELATION TO ANY LICENCE FOR SOPHOS UTM PRODUCTS, EXCEPT FOR SUITE LICENCES THAT COMBINE UTM AND OTHER SOPHOS PRODUCTS, THE RESTRICTION ON THE NUMBER OF USERS AND THE REQUIREMENT FOR SERVER LICENSES IN CLAUSE 3.3.1 DOES NOT APPLY TO LICENSEE. Instead, the following restriction shall apply: neither the total number of Users nor the total number of Computers (including without limitation workstations, clients, servers, and other devices) that are protected by or receive service from the Sophos UTM Product may exceed the total number of User Licenses;
3.3.5 IN RELATION TO ANY LICENCE FOR SOPHOS UTM PRODUCTS, EXCEPT FOR SUITE LICENCES THAT COMBINE UTM AND OTHER SOPHOS PRODUCTS, THE RESTRICTION ON THE NUMBER OF USERS AND THE REQUIREMENT FOR SERVER LICENSES IN CLAUSE 3.3.1 DOES NOT APPLY TO LICENSEE. Instead, the following restriction shall apply: neither the total number of Users nor the total number of Computers (including without limitation workstations, clients, servers, and other devices) that are protected by or receive service from the Sophos UTM Product may exceed the total number of User Licenses;
The critical question is whether a device on the the other end of a site-to-site tunnel is a computer that is "...protected by or receives service from the UTM". What exactly constitutes 'receiving service'? Sure - the remote vpn gw itself may be 'receiving service' in terms of running an encryption tunnel, but behind it, the computers are not 'serviced' by the Astaro UTM.