This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IPSec tunnel traffic being NAT'ed without NAT rule

I cannot figure out why my virtual Sophos XG in Azure is NAT'ing traffic across my IPSec VPN tunnel. There is no NAT rule in place for this. In fact, there's only one NAT rule on the whole XG. But all traffic from my local network, going over the tunnel, gets its source IP translated to the WAN IP of the XG.

Here's a relevant packet capture screen shot, in which you can see that no NAT rule is being applied to ICMP traffic. This is happening with all traffic, for the record. PortA is my LAN port, PortB is my WAN port, and ipsec0 is my IPSec tunnel.

Here's the ONLY NAT rule on the entire XG. "Internal Networks" is a network group that contains only my LAN network. The network definition has been verified multiple times.

Here's my IPSec tunnel. "Corporate Primary LAN Network" has been verified to be accurate multiple times. The tunnel status is all green, and traffic coming FROM the other side of the tunnel behaves properly, without NAT translation. Pings from Corporate work perfectly, but pings from the Azure network do not.

Here's the relevant firewall rule it's hitting on my Azure XG (rule #3). "Internal Secure Networks" is a group that also currently only contains my Primary LAN Network (the Azure LAN). "IPSec Networks" is a group that currently only contains the Corporate Primary LAN Network. There are no filtering or security features turned on for this rule, and it is not linked to my NAT rule.

There are no SD-WAN route rules, no static routes, and I have not manually added any routes via the CLI. This is a fresh install that was created using the Sophos GitHub template here. I've used this template multiple times in the past without issue in nearly identical deployments. I have the no Network Security Groups in my Azure deployment, and I have the standard Route Table in Azure for destination 0.0.0.0/0 in the LAN subnet pointing to Virtual Appliance 10.101.1.4 (my XG's LAN port IP). I can confirm on a VM in that subnet that the traffic is properly hitting the XG then flowing out to the internet using the Public IP assigned to the XG's WAN interface in Azure. Again, I have many of these set up in the past, so this is all nothing new.

Interestingly, my only NAT rule for masquerading traffic out to the internet isn't increasing its usage counter. However, the source IP is being translated anyways, in the same manner that my IPSec traffic is being translated, just out of a different port. (PortB vs. ipsec0)

My route precedence is static, VPN, SD-WAN, confirmed in the GUI and CLI. My original firmware version was 18.5.1, but I tried to upgrade to 19.0.0, with no change. The firewall has been rebooted multiple times.

Here's my full current routing table according to the CLI. I've compared this to known-good firewalls and it seems to be similar.

Thanks in advance...



This thread was automatically locked due to age.