This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

No WebAdmin access over VPN using public hostname

I can't access the WebAdmin despite being connected via VPN (SSL).

Here's the basic configuration:

The UTM has a publicly accessible hostname (with matching certificate) - COMPANY.COM -> our public IP
On our internal DNS it also has a local DNS entry - UTM.LOCAL.NET -> UTM local IP
The WebAdmin has been configured to allow all connected from our internal network, as well as the IP pools for SSL.

After I connect via VPN (SSL), I can't connect via the COMPANY.COM address, but I CAN connect using the UTM.LOCAL.NET address. That said, any machines which are physically in our LAN can indeed connect to the WebAdmin using the public DNS name.

When checking the logs, it logs a blocked WebAdmin access attempt coming not from the assigned VPN IP, but from my home IP. On one hand, this is understandable, but on the other... how do I make this work?

My only idea thus far is to add a local DNS entry overriding the COMPANY.COM public DNS, so it points to the internal LAN IP of our UTM, rather than the public IP... but there's a minor issue with that (unrelated to this question) and feels like a workaround rather than an actual solution to the problem.

So... what could I do?



This thread was automatically locked due to age.
Parents Reply Children
  • This sounds like a good idea, in general, and I'll see about implementing it. I do, however, need to be on-site for this, so this'll have to wait till Monday... Till then I'm left accessing the WebAdmin via the internal DNS name as before.

  • One extra question... while I definitely plan to use the UTM as the DNS server, I fail to see how that will resolve the issue with the WebAdmin access over VPN.

    So, OK, the UTM will be the DNS, but it'll still resolve the public DNS name as the public IP and internal name as the internal IP... which means that I'll be getting the same errors I am getting right now (access over public DNS name is blocked while access over local DNS name is permitted, but doesn't match certificate).

    About the only thing I can think of is to add a static DNS entry for the WebAdmin to always use the internal IP (overriding the public DNS name), so if the UTM DNS is used after someone connects via SSL, then it'll work. That's assuming the VPN client does, in fact, use the VPN DNS and not the primary DNS of the machine...

    So, to summarize, how will that help solve the WebAdmin access problem?

  • You are right about certificate error, but i think static dns for External IP should work

  • OK, I've spent some time today reworking our DNS servers (there was actually a good reason to do so, as one of our DNS servers, which was supposed to be publicly facing and serving only public DNS records was misconfigured and wasn't publicly facing nor was it serving the right records). As such the UTM is now our primary DNS server with redirects to our internal AD DNS servers, as you suggested.

    I've since removed the public DNS name for the WebAdmin and instead created a new, static entry, in the UTM itself. Suffice to say, things are working exactly as I'd like them to. :)

    Thanks for the help!