Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL VPN Client can connect but no traffic is generated to VPN zone

Hi all,

I was able to use SSL VPN properly with Sophos XG v19. Now I've upgraded to v20 and I'm experiencing issue with SSL VPN.

To setup the SSL VPN I followed this guide: https://techvids.sophos.com/watch/wtqMJE1La6TkFjAiaT2d3H

I draw a network scheme to better explain how the network is configured:

I'm using an iPhone with OpenVPN installed as a client. It can connect and authenticate properly, the OpenVPN iPhone app shows that XG assigned the IP 10.10.70.1

I've a firewall rule that allow traffic from VPN to DMZ,WAN and LAN:

In the firewall log I can't see any traffic generated through the VPN, traffic flows regularly into the XG on port 8443 (I've check with tcpdump ssh-ing into XG firewall).

I've also tried to attach a Linked NAT rule to Masquerade (MASQ) all traffic that comes from VPN zone. The client can't reach any DMZ hosts neither any internet host (I would like to use the VPN as the default gateway).

Can anyone help me to solve this issue?

Thanks in advance



This thread was automatically locked due to age.
Parents Reply
  • Hi @Angelone, for the sslvpn ra traffic issue, we can take a look at your setup in a joint debug over a call. Please DM me (sreenivasulu.naidu@sophos.com). From the attached logs, there is no sslvpn.log, traffic issues could not be figured out from this log. When you are seeing traffic on port 8443, just do a tcpdump on tun0 (assuming you are using XG and not XGS), if you see packets on tun0 (on XG), this is unencrypted packet, see the packet is routed correctly to your host on DMZ and verify the return path of the packet.

Children