Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Recommendations for Site2Site TunnelAll VPN

We will have a special deployment at one customer soon.

The customer has serveral branch offices where Sophos XGS 136 will be the local gateway for 5-6 subnets for each branch office.
The BO firewalls will only have base subscriptions and only some firewall rules for local subnet-rules like "https allowed from LAN to DMZ".

In the head office there is an XGS HA cluster (XGS3100) which will be the central internet breakout for all BOs and the HO.

The BO firewalls will be connected through route-based VPNs to the HO and will have no local internet breakout (device traffic should pass the HO firewall, too). At first they will theoretically have a local WAN interface but in a few months the BO's WAN connections will be changed to MPLS connections with no direct internet connection.

Today we have one older XG firewall that is already completely tunneled to the HO (policy-based, since it is a Sophos SG UTM) but I wonder if my configuration is "best practice" for a SFOS firewall behind another firewall.

To make anything of the firewall itself working I had to create a NAT policy for system originated traffic, first I was hoping, that this firewall would use it's WAN interface for that but - with an "ANY" on the other side of a VPN-tunnel this doesn't seem to be true.
SNAT IP is the firewall's IP on the LAN zone. DNS server for the BO firewall is the HO firewall.

Anything else I should look for or take into planning?

I know that the lack of network protection in the BOs could be a bit of an issue.



This thread was automatically locked due to age.
Parents
  • As long as you have a UTM on the other end, use RED site to site and interact with the tunnel like a route based VPN tunnel. 

    SFOS to SFOS should be Route based VPN. 

    __________________________________________________________________________________________________________________

  • The UTM won't be an issue, it will be exchanged first, then the BO firewalls (currently the older XG and the rest are Cisco ASAs).

    Regards,

    Kevin

    Sophos CE/CA (XG, UTM, Central Endpoint)
    Gold Partner

Reply Children
No Data