Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

VPN Split Tunnel traffic Issues

Hi all-

Hoping for some help with an ASG320 running UTM9 9.3x software. Recent setup, running VPN remote access PPTP in a windows environment. 

The current setup is using the UTM9 as a firewall/network protection. VPN currently works, but I cannot get split tunnel traffic to work correctly. When connected to the VPN, in a non-split tunnel environment, I get a default gateway on the VPN connection of 0.0.0.0 and everything seems to work (RDC, local domain DNS resolution before reaching external - DNS is being handled by a windows DNS server). When I run split, I'm not getting assigned a default gateway at all on the VPN connection, and cannot access network (VPN resources). Currently, I have the UTM9 pointing DNS to my DNS server, then to Google as a secondary (even though my DNS server reaches to Google for DNS if internal cannot be resolved). 

The only reason I point to the UTM9 first is that this identical setup worked prior to being migrated to a new site with the UTM9 as a firewall device. Is there a default gateway setting I'm missing somewhere?

 

Cheers,



This thread was automatically locked due to age.
Parents Reply Children
  • Okay, so I seem to have the split-tunnel aspect working, but still have an ongoing DNS issue. 

    The split-tunnel "works" but now I am unable to access local resources while on the VPN (while in a split-tunnel configuration). When I am on "split tunnel" - I am unable to ping anything beyond the firewall (but I can access it, check the logs, and see no dropped traffic from the VPN). 

    I cannot manually ping my DNS server, DHCP server, only the firewall. Any hail-mary passes here?

  • If things work correctly after you make a Masq rule like 'VPN Pool -> Internal', then that will prove that you've misconfigured something.  In that case, check #3 through #5 in Rulz.  Any luck with that?

    Cheers - Bob

  • BAlfson said:

    If things work correctly after you make a Masq rule like 'VPN Pool -> Internal', then that will prove that you've misconfigured something.  In that case, check #3 through #5 in Rulz.  Any luck with that?

    Cheers - Bob

     

     

    I created a Masq rule VPN-->LAN. Still unable to ping internal resources beyond the firewall.

     

    Edit: from the split-tunnel VPN, I cannot even ping the LAN IP of the UTM. Does that provide any info?

  • That's the first you've mentioned pinging in a way that I've noticed it.  Pinging is regulated on the 'ICMP' tab of 'Firewall'.  The "Any" Service object includes only TCP & UDP, none of the other IP protocols.  Did that resolve your issue?

    Cheers - Bob

  • BAlfson said:

    That's the first you've mentioned pinging in a way that I've noticed it.  Pinging is regulated on the 'ICMP' tab of 'Firewall'.  The "Any" Service object includes only TCP & UDP, none of the other IP protocols.  Did that resolve your issue?

    Cheers - Bob

     

     

    Here's my ICMP config. Let me know if you see anything that would cause issues. Pinging works fine on the full-tunnel, just not on a split tunnel. On a split tunnel, all the traffic stops at the Firewall and cannot access VPN resources. 

  • Does doing #1 in Rulz give you any clues?

    Cheers - Bob