Sophos Firewall: How To Configure SSL VPN Remote Access When Sophos Firewall is Behind a NAT Device

Disclaimer: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.


Overview

This Recommended Read describes configuration steps on Sophos Firewall for Remote Access SSL VPN when Sophos Firewall is behind a NAT device.

Requirements

Configure SSL VPN Global Settings

In this setting on your Sophos Firewall, go to Remote access VPN > SSL VPN global settings > Override hostname. Then, you need to input the public-facing IP of the NAT router/device.

If the provided IP of the ISP is dynamic, you can use or opt for a DDNS in this configuration section. If you don’t have a DDNS and static Public IP on the ISP router, you must manually update the override hostname whenever the IP changes from the ISP side.

Using DDNS in the Override hostname section:

When you use DDNS in the Overriede hostname, You must also have a DDNS setting configured under Network > Dynamic DDNS

In the example, we’re using NO-IP as a DDNS provider. Note that only choose DDNS providers supported by SFOS to make this configuration work. Further, before using DDNS in the SSL VPN Override settings, the “Last Updated Status” must be “Success” here on this configuration section and you may also test externally to check that the hostname is publicly resolvable.

For more details on how to configure DDNS on Sophos Firewall, you may refer to this document guide:

https://doc.sophos.com/nsg/sophos-firewall/19.5/help/en-us/webhelp/onlinehelp/AdministratorHelp/Network/DynamicDNS/NetworkDynamicDNSProviderAdd/index.html

After completing these settings, users must re-download and update the configuration file.

Configure Inbound NAT on the NAT Device/Router

In this section, you must have access to the router or be able to request configuration to the ISP. Configuration is an inbound NAT from the set Public IP or the Publicy resolvable hostname (DDNS) -> NATed / going to the Sophos Firewall with port 8443 (TCP or UDP) - it depends on the option you chose on the SSL VPN Global Settings and depends on what port you use for SSL VPN.

Download the SSL VPN Client and Verify the .OVPN File

After the configuration for Sophos Firewall and NAT router has been done. Proceed to downloading and installing of the client and configuration file (.OVPN) > Then you may verify on the OVPN file if the Override configuration has taken effect. It should be able to contain something like "remote <public IP> 8443" where on public IP is your ISP's public IP.

If you opt to use DDNS, you can also verify the settings in the .OVPN file

After this, the client should be able to establish connectivity with Sophos Firewall and on the permitted networks on your SSL VPN configuration.

Related Information

Doc guide: How to Configure SSL VPN on Sophos Firewallhttps://doc.sophos.com/nsg/sophos-firewall/18.5/help/en-us/webhelp/onlinehelp/AdministratorHelp/VPN/RemoteAccessVPN/VPNRemoteAccessSSLVPNSophosConnectClient/index.html#install-and-configure-sophos-connect-client-on-endpoints 

Sophos Techvid: How to Configure SSL VPN on Sophos Firewall: https://techvids.sophos.com/watch/wtqMJE1La6TkFjAiaT2d3H




Revamped RR Corrected Grammar
[edited by: Erick Jan at 7:41 AM (GMT -7) on 5 Oct 2023]