Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

Sophos Firewall: SSL VPN troubleshooting

Disclaimer: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.


This Recommended Read covers the most common SSL VPN issues and how to solve them. 

  • Verify the user’s portal accessibility 

Ensure the SSL VPN service is selected for the WAN interface under Administration > Device Access. 

 

  • Verify the Port used for SSL VPN 

Configure >> VPN >> Show VPN settings >> SSL VPN 

The default port, 8443 is used for SSL VPN connections 

 

For Version 19.

Configure>>Remote Access VPN>>SSL>>SSL VPN Global Settings

Configure>>Site-to-Site VPN>>SSL>>SSL VPN Global Settings

Note: The configured pormust be open on inbound connections to the firewall and outbound from the client’s network.  

This is to confirm whether the Sophos Firewall is receiving traffic on port 8443. Use the Packet Capture on the GUI, please go to Monitor & Analyze >> Diagnostics >> Packet Capture >> Configure

Alternatively, you can also use the CLI. Log in to the command-line interface (CLI) and select 4: Device Console. Run the command below and ask the user to try to connect.  

Console> tcpdump “port 8443”  

If you don't see traffic arriving at the port, and your Sophos Firewall is the border router, your ISP is blocking this port.

If your Sophos Firewall doesn't have a Public IP on the WAN port, check that your ISP has the port open and  that your upstream router has a DNAT rule on the selected SSL VPN to send to the Sophos Firewall, if you don't see traffic arriving, either your ISP is blocking the port or your Upstream device.

Note: It is better to change the SSL VPN port to 443, as it is usually open on most networks. If you decide to do this, remember that the User Portal and any other service shouldn’t use the same port unless you have an additional WAN interface. 

  • Confirm you don’t have a DNAT rule with service ANY 

If you have a DNAT rule with service ANY or the same port used for SSL VPN, the XG won’t intercept the SSL Connection but will pass it down to the server selected in the DNAT/Business rule. This will cause users to be unable to connect to the SSL VPN. 

If you have a rule with Service, change this to use the correct port/service. 

  • Confirm the default certificate information is filled in and ensure there are NO special characters in the certificate name or any other fields. 

Once you have done the steps above, ask the user to re-download the configuration from the user portal.  

  • If your Firewall is behind another NAT device (Router) (Sophos Firewall doesn’t have a Public IP). 

Make sure that under Configure >> VPN >> Show VPN settings >> SSL VPN >> Override hostname, you add the Public IP of the upstream device or DynDNS FQDN 

 

For Version 19

Configure>>Remote Access VPN>>SSL>>SSL VPN Global Settings

Configure>>Site-to-Site VPN>>SSL>>SSL VPN Global Settings...

 

Note: If your XG has more than one WAN interface, you specify the Public IP of the WAN interface to which you want the SSL VPN to connect or a publicly resolvable hostname. 

If internet users can't resolve the Sophos Firewall hostname, (resolvable on the Internet), you need to specify a public IP under  "Override hostname"

The Sophos Firewall hostname is configured via System > Administration > Admin and user settings

  • Confirm the time and time zone in the Sophos Firewall is correct 

Go to System >> Administration >> Time  

Confirm that the Time Zone is correct. If you set the time manually, double-check that there is no time skew and that it is not off by more than 2 minutes. In any case, we recommend the use of Pre-defined NTP Server. 

Note: After a change in the time, a restart is necessary for it to take effect. 

  • Common log errors: 

VERIFY ERROR: depth=1, error=certificate is not yet valid 

Please make sure to update the firewall's Default Certificate and ensure there are no special characters in the certificate name or any other fields. Once you update the default certificate, delete the user certificate from the firewall, and download the configuration from the user portal, this process will re-generate the user certificate. 

VERIFY ERROR: depth=0 error=format error in the certificate’s not  

Please update the Default Certificate of the firewall and ensure no special characters are in the certificate name or any other fields. Once you update the default certificate, delete the user certificate from the firewall, and download the configuration from the user portal, this process will re-generate the user certificate. 

The tunnel is connected, but users are unable to access remote resources. 

Make sure you have configured the correct VPN to LAN/DMZ Firewall rules 

Confirm the range of IPs for the SSL VPN Global Settings matches the Source Network in the Firewall Rule for VPN to internal resources.

Ensure that the subnet where the user is connecting doesn’t overlap with a subnet they’re trying to access behind the SSL VPN.  

If SSL VPN users can't access internal resources via hostname, kindly ensure the proper DNS server is configured in SSL VPN Global Settings.

TIP: To overcome this potential issue, avoid using the following three networks in your Sophos Firewall: 192.168.0.0/24, 192.168.1.0/24, and 192.168.2.0/24 (which are the subnets used by 99% of home users by default). 

Traffic generated from the SSL VPN is assigned to the Tun0 interface. To confirm if traffic within the SSL VPN is arriving at the Sophos Firewall, try running the following command from the Advanced Shell of the Sophos Firewall or the GUI using the Packet Capture. 

# tcpdump -eni tun0 host x.x.x.x (x.x.x.x = IP assigned to the SSL VPN client) 

Note: When initial testing, kindly disable the computer or device destination Firewall. (E.g, Windows Firewall) 

Check out this Recommended Read on how to NAT IPsec traffic. It applies the same principle to SSL VPN. 

Troubleshooting 0-byte SSL VPN file 

If you run any version below 17.5 MR12 and 18.0 MR1, kindly upgrade. If the issue persists after upgrading, look at this Recommended Read. 

Sophos Firewall: Troubleshooting 0 Byte SSL VPN File 

  • Additional links and info: 

KB Articles 




Revamped
[edited by: Erick Jan at 3:16 AM (GMT -8) on 24 Dec 2024]