Configuring VPN Remote Access for the first time on your Sophos XG Firewall? Check out this useful Community post!
We'd love to hear about it! Click here to go to the product suggestion community
I've completed site-to-site VPN setup with AWS using transit gateway using Sophos XG firewall.
internal network (10.x.x.x) ------sophos-xg------site-to-site-vpn-AWS--------vpn-gw-----transit-gateway-----vpc (172.31.0.0/16)
- ping from internal network to vpc and ping from vpc to internal network
- outbound tcp session to AWS VPC
- traceroute from internal network to vpc
what doesn't work:
- traceroute from vpc to internal network
- AWS VPC tcp inbound connection into internal network
For the inbound TCP connection (test to port 9999), I can see the VPC on 172.31.x.x packet reaching the firewall on WAN interface 218.x.x.x. Internal network is 10.x.x.x ip address.
is DNAT rule required to make this work? I tried playing with it but haven't got it to work either.
Forgot to mention the VPN tunnel is established and routing has been set up on both sides.
Actually i would recommend to (wait) and update to V18.
V18 will introduce Route Based VPN with VTI.
This will make your Setup much easier.
Is this a production environment or are you happy to try a Early Access Version of V18?
In reply to LuCar Toni:
Thanks for the reply.
This is for a production environment.
When is the expected release date of V18?
Is there any workaround for now to fix the issue?
In reply to fustyler:
Route Based VPN Would not be a Workaround, it would be a better approach to this kind of VPN.
I guess something is blocking the traffic, maybe AWS or maybe XG.
You should Dump the traffic on XG and take a look, if the traffic is reaching XG.
Maybe try a drppkt on the Shell to see dropped Packets.
The attached screenshot I showed from the logs displays the packet drops going to the wan interface of the internal network firewall.
When you say you are trying to connect into internal network using TCP connection, why we see traffic destination as public IP address? It shouldn't be the IP address of internal network? I am saying this because inbound interface is ipsec0 so the inbound traffic is routed through IPsec tunnel and XG firewall expects traffic destination as internal IP address from internal network matching IPsec connection profile.
Is there any NAT rule configured on AWS side?
In reply to H_Patel:
there is no NAT set up on the AWS side.
How many SAs do you have configured in your ipsec policy on the XG?
On v17.x/v16.x, the XG is a policy based IPsec device. AWS only supports a single SA within your tunnel.
For traceroute problem, you would need to enable IGMP/PING on XG and AWS to allow it.
Please remember that you will need to create firewall rules.
Also inside your IPsec networks, you must make sure the far side is included in the configuration otherwise it will not route.
However I do agree with lferrara that you should utilize v18 and choose the option to use route based VPN.
In reply to KingChris:
firewall rules are in place to allow all traffic bi-direction as the first rule.
AWS confirmed IPSec tunnel was formed correctly after reviewing packet captures.