Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

HTML5-VPN: How to access ressources behind IPsec tunnel?

Hi!

I've set up an IPsec site to site tunnel between two XG Firewalls (called "XGA" and "XGB") and almost everything is working fine, except one thing:

It seems that the XGs itself don't have a route to the opposite end of the tunnel. For example, if I set up a bookmark for a resource, which is in XGB's subnet, I cannot connect to it within XGA's user portal and vice versa. The same does work perfectly when accessing a resource which is not behind the IPsec tunnel.

I've already observed the connection using the built in packet sniffer and it seems that traffic which is generated by XGA gets routed through Port1 (WAN interface) instead of ipsec0. Setting up static routes fails because the web interface won't let me choose ipsec0 as a gateway interface.

Firewall rules do exist for VPN<->LAN, LAN<->VPN and VPN<->VPN on both XGs.

Is there anything I'm missing? I had the same problem with the UTM and never got it to work :-(

Thanks for any help!  



This thread was automatically locked due to age.
Parents
  • Oxident,

    without a proper static route all traffic by default will be forwarded to WAN interface.
    So you need to create a static route. Have a look at command you find at pag 36. Here the CLI Guide: docs.sophos.com/.../Sophos Firewall OS CLI Guide.pdf

    Let us know.

    Luk
  • Hi Luk,

    thanks for this information. Now I've added the static using this scheme:

    On site XGA (local network is 10.0.0.0/24):

    system ipsec_route add net 192.168.100.0/255.255.255.0 tunnelname XGAtoXGB

    system ipsec_route show

    -> tunnelname              host/network        netmask
    -> XGAtoXGB       192.168.100.0       255.255.255.0

    On site XGB (local network is 192.168.100.0/24):

    system ipsec_route add net 10.0.0.0/255.255.255.0 tunnelname XGBtoXGA

    system ipsec_route show

    -> tunnelname              host/network        netmask
    -> XGBtoXGA              10.0.0.0       255.255.255.0

    But I still can't ping any host on XGA's site from XGB's console (and vice versa).

    Interestingly, I now see the following information in XGA's paket sniffer while pinging 192.168.100.15:

    In (empty)
    Out ipsec0
    Ethernet IPv4
    Src-IP 169.254.234.5
    Dst-IP 192.168.100.15
    Type ICMP
    Rule-ID 0
    Status generated

    So I see that those packets are no longer routed through the WAN interface ... but why does it use this Src-IP? I mean, XGA's LAN IP should be 10.0.0.1, shouldn't it?

Reply
  • Hi Luk,

    thanks for this information. Now I've added the static using this scheme:

    On site XGA (local network is 10.0.0.0/24):

    system ipsec_route add net 192.168.100.0/255.255.255.0 tunnelname XGAtoXGB

    system ipsec_route show

    -> tunnelname              host/network        netmask
    -> XGAtoXGB       192.168.100.0       255.255.255.0

    On site XGB (local network is 192.168.100.0/24):

    system ipsec_route add net 10.0.0.0/255.255.255.0 tunnelname XGBtoXGA

    system ipsec_route show

    -> tunnelname              host/network        netmask
    -> XGBtoXGA              10.0.0.0       255.255.255.0

    But I still can't ping any host on XGA's site from XGB's console (and vice versa).

    Interestingly, I now see the following information in XGA's paket sniffer while pinging 192.168.100.15:

    In (empty)
    Out ipsec0
    Ethernet IPv4
    Src-IP 169.254.234.5
    Dst-IP 192.168.100.15
    Type ICMP
    Rule-ID 0
    Status generated

    So I see that those packets are no longer routed through the WAN interface ... but why does it use this Src-IP? I mean, XGA's LAN IP should be 10.0.0.1, shouldn't it?

Children