This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL-VPN and DNS network definitions

Dear Community,

We're currently in the process, where we implement our SSL-VPN remote access with FQDN based policies – What we're trying to ahchieve is a Split-Tunneling like behavior, where our SSL-VPN clients would go through the tunnel, only when they're trying to reach, say, community.sophos.com.

What we're currently encountering is the behavior of the UTM, where it «kills» all the SSL-VPN sessions, when there's a change in a «DNS group» network definition. Let's assume that we had definied «sophos.com» under the DNS group network definition – The UTM resolves the name, keeps the IP addresses returned in the DNS response and passes those addresses as /32 host routes to the SSL-VPN clients. So far, so gut – But then, when the TTL of the DNS response expires, the UTM resolves the name again and, quite naturally, gets different IP addresses in the DNS response. Now the UTM kills all the SSL-VPN sessions, so that, apparently, it can push all the new routes as «protected» destinations.

Though it may be a reasonable behaviour, given the fact that UTM is a security appliance, what we'd like to know is whether if it is an expected behaviour. Isn't there a way, where we can push new routes to SSL-VPN clients without closing the SSL-VPN sessions? In today's environment, it seems kind of like something what we should take into the consideration, that the IP addresses of an external service do change in a relatively frequent manner.

Please let me know what you think about the issue – I'm looking forward to your insights!

Best regards,

iichikocchi



This thread was automatically locked due to age.
  • Hallo and welcome to the UTM Community!

    You've described a solution that doesn't work, but it's not clear what you're trying to accomplish.  Do you want only a few websites accessible through the SSL VPN tunnel, but have all other accesses not go through the tunnel? Or?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi Bob (),

    Thank you very much for your comment. Yes, what we're trying to achieve is as you described, to go through the tunnel just for specific websites. Those websites, mostly SaaS products, implement IP-based access restrictions and we're trying to enable a remote access to them for our employees.

    Best regards,

    iichikocchi

  • Yeah, I don't see an easy way to do this if you have SaaS providers with TTLs that are so short that they can expire in the middle of the day.  I think you're stuck with including "Internet IPv4" in 'Local Networks' unless your providers can give you the potential subnets to include there.

    If there's only one or two that can't supply a subnet, you might be able to accomplish what you need with DNATs and Additional Addresses on the Internal interface if you can aim those apps at the addresses instead of at the provider's FQDN.

    Please let us know what you wind up doing as I bet you're not alone with this issue.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA