Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Use Remote Access SSL VPN to reach 4 different internal networks

Hello,

We convert the configuration from UTM 135 to XGS 136 and we have one Problem with Remote Access SSL VPN and sNAT.

With the UTM we have a C2S SSL VPN for Homeoffice users to the main office (1).

The main office has 3 additional S2S connections to other locations (networks) (2-4).

User can reach also these networks (2-4) by using this C2S VPN by using sNAT pointed to the internal FW IP

The traffic is transferred by sNAT to the other three networks 2-4.

This works fine with the UTM but we can’t get it work with the XGS.

Please see below the configuration we have done.

@ at the connection list we can see that ping use the roule. but we get no ping or connection to the networks 2-4



This thread was automatically locked due to age.
Parents Reply
  • Hi Erick,

    no the client can connect to the mail office and reach the resource at the main office. But he isn't able to use the resources (networks) of the sub office witch are connected via IPSEC. There is no manual how to configure this! The way I showed worked at the SG135,...but not at the XG. I'm wondering that this normal case of use is not documented. 

    But the good news I solved the problem by setting separates routes on the console mode.

    console> system ipsec_route add net 10.182.0.0/255.255.0.0 tunnelname MainOffice2SubOffice1  (this is name your ipsec tunnel at the S2S-VPN )

    I think that is a very important additional information for all configurations with sub networks

    best regards Peter

Children