This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Configure Sophos UTM SG-210 with rules to allow traffic L2TP/ipsec up to Microsoft VPN server:RRAS installed

Hello,

We have a solution VPN enabled with SG-210 UTM working fine with L2TP/Ipsec remote access built-in.

And we have implemented a Microsoft VPN server with Remote Routing Access Role in order to use Microsoft  Azure MFA NPS extension fro RADIUS.

--> FYI Radius Test from the FW doesn't work anymore once NPS Extension for MFA installed on the Radius server

-->Reason we have tried to implemented this VPN server enabling the same protocol L2TP

VPN connection works fine with protocol PPTP and PPTP enabling with several DNAT rules configured like below:

But it doesn't work for L2TP/Ipsec despite several rules attempts: same rule also with L2TP protocol enabled

What are the exact rules to be implement for this protocol so it could run fine?

Is there maybe some restricitons for this model?

Thanks in advance.

Best regards.

 

Jean-François



This thread was automatically locked due to age.
Parents
  • Salut Jean-François and welcome to the UTM Community!

    I'm a visual-tactile learner, so I would need to see a diagram with IPs noted to be able to have a better guess at your issue.  My first thought relates to IPsec which doesn't like being behind a NAT.  You would look at the IPsec logs in the UTM and Azure to find evidence of that.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Salut Bob,

    I let you check also my answer to Emmanuel about that.

    Regards,

    Jean-François

  • Et bien, Jean-François, it's what I suspected.  IPsec doesn't like NAT.  In order to help you solve this problem, please show a diagram (a photo of hand-drawn works).  Include IPs.  Also, show a picture of the Edit of the DNAT rule.

    It's entirely possible that there's no solution with L2TP/IPsec on the WinServer.  Have you considered making the UTM the L2TP/IPsec remote access server?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hello Bob,

    Here are various items requested:

    These steps followed to implement this solution:

    https://www.wintips.org/how-to-setup-vpn-server-2016-with-a-custom-ipsec-for-l2tp-ikev2/#step-6

    About your last question I have mentioned in my initial request:

    "And we have implemented a Microsoft VPN server with Remote Routing Access Role in order to use Microsoft  Azure MFA NPS extension fro RADIUS.

    --> FYI Radius Test from the FW doesn't work anymore once NPS Extension for MFA installed on the Radius server"

    So we have  the UTM running fine with the L2TP/IPsec remote access server built-in but incompatibility issue when Azure MFA NPS installed and Microsoft recommend their own solution to implement this feature:

     https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension-vpn

    Regards.

    Jean-François

  • Do I understand correctly that it's an instance in Azure that's trying to connect with L2TP/IPsec to your Winserver?

    What do you see in the Winserver IPsec log when the connection attempt fails?  Do you see any related drops in either the Intrusion Prevention (anti UDP Flooding could be an issue) or Firewall logs in the UTM?

    Cheers - Bob

    PS See #5 in Rulz (last updated 2019-04-17).

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • There isn't any instance from Azure trying to connect to this VPN: just a Windows client configured as described in the link above

    Windows VPN Server logs: only port 500 and 4500 not 1701 L2TP as it it already blocked in the FW

    no drops reported either in Intrusion Prevention or Firewall logs

    Jean-François

Reply
  • There isn't any instance from Azure trying to connect to this VPN: just a Windows client configured as described in the link above

    Windows VPN Server logs: only port 500 and 4500 not 1701 L2TP as it it already blocked in the FW

    no drops reported either in Intrusion Prevention or Firewall logs

    Jean-François

Children