Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Since the last Update Windows 10 and Sophos VPN doesn't work

After Update our Sophos Appliance to the latest 9.4 version, the VPN with Windows 10 doesn't work.

Windows 7 works perfekt no Problem, but ohn windows 10 the VPN connect, but no RDP connection possible!

Has anyone the same problem?

regards Peter



This thread was automatically locked due to age.
  • Yes. The VPN client is not getting pushed the route to your internal network. See this thread for a temporary solution: community.sophos.com/.../294417

    -----------------------
    SG210/UTM 9.407-3

  • Yep. I implemented a temporary workaround by changing /var/sec/chroot-openvpn/etc/openvpn/openvpn.conf as such:

    # push 'route-gateway 10.242.2.1'
    push "route 0.0.0.0 0.0.0.0 10.242.2.1"

    And then ran:

    /var/mdw/scripts/openvpn restart

    Reconnected the SSL VPN, and all is well.

  • Unknown said:

    Yep. I implemented a temporary workaround by changing /var/sec/chroot-openvpn/etc/openvpn/openvpn.conf as such:

    # push 'route-gateway 10.242.2.1'
    push "route 0.0.0.0 0.0.0.0 10.242.2.1"

    And then ran:

    /var/mdw/scripts/openvpn restart

    Reconnected the SSL VPN, and all is well.

    You are a star. Won't this set the default route, though, and make *all* requests go through the tunnel? I modified the command to just route requests to the remote internal subnet:

    push 'route 192.168.5.0 255.255.255.0 10.242.2.1'

    -----------------------
    SG210/UTM 9.407-3

  • Hi All,

    Please refer the link below, hope that helps:

    https://community.sophos.com/products/unified-threat-management/f/58/t/55773

    Thanks

    Sachin Gurung
    Team Lead | Sophos Technical Support
    Knowledge Base  |  @SophosSupport  |  Video tutorials
    Remember to like a post.  If a post (on a question thread) solves your question use the 'This helped me' link.

  • Matthew said:

    Tim Dufrane

    Yep. I implemented a temporary workaround by changing /var/sec/chroot-openvpn/etc/openvpn/openvpn.conf as such:

    # push 'route-gateway 10.242.2.1'
    push "route 0.0.0.0 0.0.0.0 10.242.2.1"

    And then ran:

    /var/mdw/scripts/openvpn restart

    Reconnected the SSL VPN, and all is well.

    You are a star. Won't this set the default route, though, and make *all* requests go through the tunnel? I modified the command to just route requests to the remote internal subnet:

    push 'route 192.168.5.0 255.255.255.0 10.242.2.1'

    Hi Matt,

    Yes, that will cause it to become the default route. For my situation that's the desired effect. The basic command, as you found, can get as granular as you want with multiple routes. However, keep in mind this will apply to all users - if you have specific users who need more specific routes, their individual configs can be modified through /var/sec/chroot-openvpn/etc/openvpn/conf.d/username.

  • Unknown said:

    I don't think this is the same issue, though I would be happy to be corrected. Anything to provide an easy fix.

    -----------------------
    SG210/UTM 9.407-3

  • Hi

    Very sorry for the troubles caused.

    This issue is being caused by users being configured multiple times in one remote access profile. So, if you configure Joe directly and Joe is also member of a group which is configured for the same profile you run into this bug. It is also triggered by the same user being member of multiple groups which are configured for SSL VPN remote access.

    You can fix the issue by removing the duplication and configure each user only once. I know that might be difficult with backend groups or comlex setups, but maybe it works for you. We are investigating what caused this regression.

  • d12fk said:

    This issue is being caused by users being configured multiple times in one remote access profile. So, if you configure Joe directly and Joe is also member of a group which is configured for the same profile you run into this bug. It is also triggered by the same user being member of multiple groups which are configured for SSL VPN remote access.

    This issue happens (for us, at least) even when the user is *not* configured multiple times in the same remote access profile.

    -----------------------
    SG210/UTM 9.407-3

  • In my case the problem was the username with "ö".

    In the last years there was no problem with it.

    regards Peter

  • Matthew said:

    This issue happens (for us, at least) even when the user is *not* configured multiple times in the same remote access profile.

    I've heared (but have not checked) that the issue also happens when the same user is configured in two or more profiles.