Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

AWS VPC Site-to-Site VPN - Splunk Forwarder Traffic on TCP 9997 Stopping at UTM

I used to run OpenSwan EC2 instances to connect two regions. I'm using centralized monitoring for instances with Splunk so I have installed Splunk forwarders on all instances that send their logs to a Splunk Indexer in Ireland. It worked for the most part but the tunnels would drop every month for some reason which would prevent logs from getting sent so I decided to move to Sophos's AWS VPC site-to-site VPN since I can eliminate the two OpenSwan instances. I had no problem sending Splunk traffic with this configuration.

I have two regions that I have connected using Site-to-site VPN --> Amazon VPC configuration in my Sophos UTM 9 appliance.

My UTM 9 Firmware version: 9.405-5

Ireland VPC CIDR = 172.20.0.0/16

Frankfurt VPC CIDR - 10.20.0.0/16

I have a Splunk instance in Ireland - 172.20.4.10 - that is listening on TCP 9997 and all instances have Splunk forwarder agents that send to 172.20.4.10:9997. However, the connection is timing out and I cannot figure out why:

Sophos UTM 9 is showing that the packets are going through:

I have successfully configured a site-to-site VPN from a UTM 9 Appliance in Ireland to an AWS Virtual Private Gateway in Frankfurt:

 

The Frankfurt Tunnel Details show that both tunnels are up:

I can SSH between two instances in each region 172.20.6.10 <--> 10.20.6.10:

Security group on Ireland instance:

Security group on Frankfurt instance:

However, this isn't working for the Splunk instance - when I try to SSH from Frankfurt to the Splunk instance in Ireland, the traffic appears go through the Ireland Sophos Firewall but not being received:

I have also verified that the VPC Flow logs show access from 10.20.6.10 before when I was using OpenSwan but not after switching to Sophos UTM 9 site-to-site VPN for AWS VPC.

The Security Group on the target Splunk instance is configured correctly (I think):

What am I missing?



This thread was automatically locked due to age.
  • This is a great job in providing complete information.  If #1 in Rulz doesn't help identify the problem, there's too much to work through for my time, probably others, too, so I would try to get Sophos Support on this ASAP.  You will need to ask for escalation to someone familiar with VPC.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Thanks Bob. I did a 1.5 hour session with Sophos support but no joy. Looks like I will have to rebuild from scratch in meticulously scrutinize every setting. :(

  • So after many hours and assistance from Sophos I finally figured it out and there is a lesson to be learned...

    ENABLE AWS VPC FLOW LOGS!!! 

    The problem was that I was opening rules from the source IPs when what I needed to do was allow TCP 9997 from source Sophos UTM 9 private IP.

    The Sophos UTM 9 was forwarding the TCP 9997 traffic on behalf of the VPN which wasn't obvious until you looked here:

  • An excellent thread - a great description of the problem followed by information helpful to the rest of us here - thanks!

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA