The Sophos will use the 169.254 address as the source ip address when it is trying to communicate over a VPN tunnel to your VPC. You need to change the source IP address used by the Sophos and stop it using a 169.254 address as the source.
Create a new source NAT rule for each VPC tunnel IP address. Set up the NAT rule as follows:
Source: 169.254.x.x (your VPC tunnel ip address on your Sophos)
Service: Any (or DNS, or ICMP, whatever you need)
Destination: Your VPC subnet CIDR block (e.g. 192.168.1.0/24)
Source IP address changes to: put your Internal LAN ip address in here (just the host address, create a network definition if you don't have one)
Make sure you have put your internal network into the Amazon VPC networks section of the VPC configuration on the Sophos so AWS can route to the Sophos to get to your internal lan address on your Sophos.
And finally, ensure your firewall rules AND your AWS ACL's and security groups aren't blocking the above source/destination/protocols
The Sophos will use the 169.254 address as the source ip address when it is trying to communicate over a VPN tunnel to your VPC. You need to change the source IP address used by the Sophos and stop it using a 169.254 address as the source.
Create a new source NAT rule for each VPC tunnel IP address. Set up the NAT rule as follows:
Source: 169.254.x.x (your VPC tunnel ip address on your Sophos)
Service: Any (or DNS, or ICMP, whatever you need)
Destination: Your VPC subnet CIDR block (e.g. 192.168.1.0/24)
Source IP address changes to: put your Internal LAN ip address in here (just the host address, create a network definition if you don't have one)
Make sure you have put your internal network into the Amazon VPC networks section of the VPC configuration on the Sophos so AWS can route to the Sophos to get to your internal lan address on your Sophos.
And finally, ensure your firewall rules AND your AWS ACL's and security groups aren't blocking the above source/destination/protocols