Disclaimer: Please contact Sophos Professional Services if you require assistance with your specific environment.
1. XG v18 firmware
2. Your OnPrem XG Firewall and the following information:
3. Your Microsoft Azure vNet and the following information:
The local network gateway typically refers to your on-premises location. You'll need the public IP address of your On-Prem Sophos XG firewall and your On-Prem Private IP address spaces. Please note that this configuration assumes that the public IP address is directly configured on the On-Prem XG firewall. Your configuration will be slightly different if your On-Prem XG firewall sits behind a NAT device.
The local network gateway typically refers to your on-premises location. You'll need the public IP address of your On-Prem Sophos XG firewall and your On-Prem Private IP address spaces.
Please note that this configuration assumes that the public IP address is directly configured on the On-Prem XG firewall. Your configuration will be slightly different if your On-Prem XG firewall sits behind a NAT device.
In the "Create local network gateway" blade, configure the following and then click on "Create":
The VPN gateway will be deployed into a specific subnet of your network called the 'GatewaySubnet'.The size of the GatewaySubnet that you specify depends on the VPN gateway configuration that you want to create. While it is possible to create a GatewaySubnet as small as /29, it is recommend to create a larger subnet that includes more addresses by selecting /27 or /28 to be able to accommodate future configurations.
In the "Create virtual network gateway" blade, configure the following:
Hello Adam,
Make sure you’re clicking under your WAN interface that connects to the Azure, it might not show, until you click a white space on the WAN interface.
Regards,
Hello everyone, I have followed this configuration example and others for an XG 18.5 because the examples of version 18 indicate that an interface is created but in my case it is not like that, dont create the interface xfrm, in any case the problem is that something is not going well with the enrouting, it creates the VPN correctly and there is traffic from Azure to OnPremise, but not from OnPremise to Azure and at some point I have, all traffic is allowed so policies are not the problem. How can I see the XG routing table? I think that is where it fails, according to the diagnostics option, the traffic must go through the ipsec0 interface, which I cannot edit or select as the default interface to create a static route, where or how can I solve the problem?
Hello, for the xfrm interface, please see the response from emmosophos. For routing, check my response to woter324. You can try to run the command "route" in the Advanced Shell to see the routes.