This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

VPN over VPN, possibly with SNAT

Hello,

I want to do an IPSEC/IKE Client-Connection to a remote network, but over an existing Site-2-Site tunnel. And I only want to route this Client via Work-Network, not everything at home. For the remote network, it should appear as if the packets are coming from the work-network, although the client is in the home network.

It's like this:

Client@Home / Home-Network (192.168.1.0, Sophos 192.168.1.254) -> S2S -> Work-Network (10.10.10.0, Sophos 10.10.10.254) -> Remote-Network (public IP 193.10.1.1, non-manageable nor managed by me)

Client@Home is doing IPSEC/IKE VPN to the public IP of the Remote-Network.

So, what I'm doing:

I have a standard static route in place, saying: For connections to 193.10.1.1, use Gateway at work (10.10.10.254).

Now I'm thinking, what do I have to put into S2S networks, both local and remote. If anything at this point. All I want to is to establish a VPN-connection, not access any networks inside the tunnel - except the ones that are already set up, like the Home-Network and Work-Network, which are already in there obviously.

I also created the back-route for the Client, I set up a static route for Home-Networks to be the 192.168.1.254, though I don't think that's needed. At this point I am trying to connect the VPN from the Client with the Remote-Network over the Sophos at work. No-go.

I tried packet capture via CLI, monitoring the internal interface of the home Sophos, I see the packets, going from the client to the remote-network public IP, and then just the 2nd packet is already: publicIP sophos@home > client@homeIP: ICMP host "remote-publicIP" unreachable.

If I remove the routing via sophos@work, then VPN connects.

Please, am I missing something obvious?

Thank you.



This thread was automatically locked due to age.
  • Hello,

    I want to change something, and the change doesn't work, so I think I best revisit this here.

    Sophos router at work has two WAN connections: LTE and DSL.

    Right now, I am using a single WAN connection (LTE) for everything - both connection between Sophos@Home and Sophos@Work (Site-to-Site) AND between Sophos@Work and Datacenter.

    However, I would like to switch the connection between Sophos@Work and Datacenter to another WAN connection (DSL).

    Currently I have an Interface Uplink with both LTE and WAN, and using Multipath Rules to regulate it. I have two rules in Multipath Rules:

    1. "RemoteNetwork (Datacenter) via WAN (by Interface)" (Any -> Any -> RemoteNetworks -> External WAN LTE)

    2. "LTE Balancing (by Interface)" (Any -> Any -> Any -> External WAN LTE)

     

    What I'd like to do is change the Rule #1 to "External WAN DSL".

    When I do that, connection of the TC with the Datacenter fails.

     

    I am failing to understand why.

  • Have you changed the VPN definition at the Data Center to use the IP of "External WAN DSL (Address)" instead of the LTE interface?

    Please show a picture of the Edit of Multipath Rule 1 above.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • I don't understand the question about the VPN definition - does that pertain to the screenshot of the Multipath-Rules above?

     

    Multipath:

    The black marked destination is a group of related networks in the data center. It contains 3 entries, one public IP of the VPN and two private networks in the data center.

    If I switch the first Multipath-Rule to "External (WAN) DSL", then I can still connect from work to data center (from 10.10.10.254 to 99.99.99.99), but I can't connect from 192.168.1.254 to 99.99.99.99).

    The Site-to-Site tunnel between 192.168.1.254 and 10.10.10.254 still remains over LTE, and should remain over LTE.