We utilize Azure for a number of things, one of which is housing certain databases and applications. Folks who work remotely and use the VPN to access our internal resources are not able to access these Azure resources because of IP filters we have in place to keep extra traffic out. Because Azure is a publicly reachable address, clients on the Sophos VPN client automatically route to those public addresses rather than through our corporate network, which in turn doesn't allow them to connect because of the whitelist connection filters we have in place in Azure. Is there a way to route only the Azure addresses through the VPN, and continue to allow other public DNS traffic to continue to route to the individual user's ISP? I'd rather not route ALL traffic through the VPN if possible, as this creates too big of a bandwidth bottleneck, and I don't want to go whitelisting random IPs given from an ISP at a user's home or cafe either. Thanks.
This thread was automatically locked due to age.