I logged a call with Sophos support 5 weeks ago now, and to date they still can't solve my problem. It's been through one guy who has assigned it to the "development team" and they still don't have an answer for me, despite constantly following them up. Anyway, enough about that I thought it's time to pose this issue to the wider community to see if anyone has any great ideas.
I have an Amazon VPC IPSec VPN tunnel running to my VPC in AWS. In AWS I have a domain controller with STAS installed. The STAS application has its service running and STAS is configured, but the problem I have is when the packets come into the UTM from the domain controller to 10.50.1.1 (LAN address of the UTM) on UDP port 6060, the traffic is being dropped against the Default drop rule which is observed in the firewall logs. I have tried configuring a specific rule which says the domain controller can talk to 10.50.1.1 on port 6060, and I have even tried with an any any any rule, and the firewall logs still shows the traffic from the domain controller going to the UTM on port 6060 being dropped. Note that i can ping the UTM on 10.50.1.1 just fine. I've also completely ruled out windows firewall even though it's not really applicable here.
Before this problem, i solved another problem where the UTM was using the Amazon VPC tunnel address (169.254.x.x) as the source address to talk to the domain controller, so i've created a source nat rule which translates traffic originating from the UTM going to the domain controller to be changed to the LAN ip address 10.50.1.1. If I don't do that, the return traffic from the domain controller never makes it back.
This thread was automatically locked due to age.