Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Azure Sophos appliance site-to-site issue

Hi All,

I have a Sophos XG deployed in Azure and an on-prem Sophos XG firewall. I have built an IP sec tunnel which is established between the 2 devices however I can only get traffic to pass one way. Azure >>> on-prem. I cannot get any traffic passing from on-prem to Azure.

When running a packet capture I can see traffic from on-prem is being accepted by the op-prem firewall and directed over the VPN tunnel, but I cannot see traffic on the Azure Sophos via a packet capture. Unsure if it is a NAT issue at the point or a routing issue in Azure.

Any advice welcome :)



This thread was automatically locked due to age.
Parents
  • Hi

    As per my understanding from the given information, you have deployed Sophos XG firewall instance on the Azure platform and create an IPsec tunnel between Azure Sophos XG and On Prim Xg firewall appliance.

    Could you please check tcpdump from SSH console for proto 50? Login to SSH console of On-prem XG and access device console and execute tcpdump 'proto 50 and check when you initiate the traffic from On-prem XG side what is the status of ESP packets going out to have any response from Azure side or not.

    Please verify the VPN to LAN and LAN to VPN firewall rule in both the firewall set to allow required traffic.

    Regards,

    Keyur
    Community Support Engineer | Sophos Support
    Sophos Support VideosKnowledge Base  |  @SophosSupport | Sign up for SMS Alerts |
    If a post solves your question use the 'This helped me' link

Reply
  • Hi

    As per my understanding from the given information, you have deployed Sophos XG firewall instance on the Azure platform and create an IPsec tunnel between Azure Sophos XG and On Prim Xg firewall appliance.

    Could you please check tcpdump from SSH console for proto 50? Login to SSH console of On-prem XG and access device console and execute tcpdump 'proto 50 and check when you initiate the traffic from On-prem XG side what is the status of ESP packets going out to have any response from Azure side or not.

    Please verify the VPN to LAN and LAN to VPN firewall rule in both the firewall set to allow required traffic.

    Regards,

    Keyur
    Community Support Engineer | Sophos Support
    Sophos Support VideosKnowledge Base  |  @SophosSupport | Sign up for SMS Alerts |
    If a post solves your question use the 'This helped me' link

Children