Hi,
I am running an IPSec VPN on an AWS instance.What I'd like to achieve is, to connect Sophos XG to this host and route all traffic from one specific internal network via this host to the internet.
I read the kba for establishing an IPSec connection as well as how to set up the firewall rules. However in this case, I use the opposite scenario. Usually the use case would be to have a branch office which connects to the head office and mainly uses the XG as the exit node for internet traffic. My scenario is the other way round.
I'd like to have the XG set up a IPSec connection to the AWS IPSec Server and uses this IPSec server as the gateway to the internet for network 192.168.66.0/24
connection should look like this:
client on network 192.168.66.0/24 (VLAN66) -> Sophos XG -> IPSec Tunnel -> AWS Instance IPSec Server -> Internet
XG already initiated the connection to the IPSec server and stays connected.
local network 192.168.66.0/24 is being set in IPSec settings
From the AWS VPN Server I can actually use the Sophos XG as Internet Gateway but, as said, that's the opposite of what I am trying to achieve.
I took the Firewall rules from the kba and inverted them in order make that set up work.
But unfortunately this didn't work.
On the AWS server side connections seems to be fine. 192.168.178.102 is the WAN interface of the XG sitting behind my router. First red line is the external IP address of the AWS Server and the second one is the external IP my own network.

So, question is, is such a setup actually possible? And if so, what are correct firewall rules to have clients in VLAN66 access the internet via the AWS VPN Server?
Best
Peter
This thread was automatically locked due to age.