<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>SSL VPN : Site-to-Site SSL and Remote Access SSL VPN : Ubiquiti EdgeOS as Client</title><link>https://community.sophos.com/utm-firewall/f/vpn-site-to-site-and-remote-access/130004/ssl-vpn-site-to-site-ssl-and-remote-access-ssl-vpn-ubiquiti-edgeos-as-client</link><description>Hello 
 I have some &amp;quot;quasi newbie&amp;quot; question about UTM 9 site-to-site and remote access SSL VPN. We have used on UTM 9 since some years remote acces SSL with OpenVPN-clients and for Site-to-Site connections IPSec. Now we would like to change for Site-to</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: SSL VPN : Site-to-Site SSL and Remote Access SSL VPN : Ubiquiti EdgeOS as Client</title><link>https://community.sophos.com/thread/477795?ContentTypeID=1</link><pubDate>Sat, 11 Sep 2021 20:33:47 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:4813d351-cc5b-4d82-ac76-dd8e1036b5a4</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;That looks great,&amp;nbsp;&lt;span&gt;Andr&amp;eacute;!&amp;nbsp; Thanks for sharing and helping the next person that needs to make the same connection.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Cheers - Bob&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSL VPN : Site-to-Site SSL and Remote Access SSL VPN : Ubiquiti EdgeOS as Client</title><link>https://community.sophos.com/thread/477771?ContentTypeID=1</link><pubDate>Sat, 11 Sep 2021 09:31:46 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:3b7eb367-99b3-49ff-8425-2ae49f9231c7</guid><dc:creator>relume</dc:creator><description>&lt;p&gt;Hello Bob&lt;/p&gt;
&lt;p&gt;Many thanks for your reply and your considerations/hints. I am sorry to get back only today - I had&amp;nbsp; some difficulty to make it work (old cached routes etc. from previous IPsec connections). Now I have some more&amp;nbsp;clearness how the &amp;quot;things&amp;quot; work (also to my previous questions):&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Port-Number and Protocol: in UTM 9.7 the settings for the port-number and protocol-type (UDP/TCP) are the same for SSL VPN Remote Access and for SSL VPN Site-To-Site. Thus if the settings are changed in one of the sections (Remote Access or Site-To-Site) the settings change for both SSL VPN types.&amp;nbsp; Thus it is not possible to separate SSL VPN types (Remote Access or Site-To-Site) by different protocol or ports. The same is true for the SSL VPN IP pool. The IP pool setting is the same for both SSL VPN types. That is somewhat strange, as in other OpenVPN installations every SSL VPN instance can have a different port and protocol&lt;/li&gt;
&lt;li&gt;&amp;nbsp;-&lt;/li&gt;
&lt;li&gt;SSL VPN tunnel IP space: UTM 9.7 pushs for the SSL VPN Site-To-Site a corresponding SSL VPN client a complete route where tunnel routing is comprised and SSL VPN tunnel IP space is given by the UTM from the selected SSL VPN pool (default SSL VPN IP pool 10.242.2.0/24). UTM takes 10.242.2.0 and other routers in the routing information will given randomly from this subnet. Thus SSL VPN Remote Access and SSL VPN Site-To-Site clients are sharing the same SSL VPN tunnel IP subnet. If an SSL VPN Site-To-Site profile is given a static virtual IP addresss an additional hop is comprised in the route pushed to the client. The virtual static IP can not be part of the pool.&lt;/li&gt;
&lt;li&gt;For the Ubiquity EdgeOS Router I was able to compose an .opvn conform conf file from the UTM .apc file by coping over the corresponding data (certs, key, user password, cipher etc.) where user and password are set in the file &amp;quot;mysite.creds&amp;quot; referenced in the conf-file:&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;client
dev tun
proto udp
remote openvpn.yourserver.com 443
verify-x509-name &amp;quot;C=XX, L=XX, O=XX, CN=XX, emailAddress=XX&amp;quot;
resolv-retry infinite
remote-random
nobind
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo yes

hand-window 30

auth-user-pass /config/auth/openvpn-mysite/mysite.creds

route-delay 4
verb 3
reneg-sec 0
fast-io
cipher AES-128-CBC
auth SHA512

&amp;lt;ca&amp;gt;
-----BEGIN CERTIFICATE-----
[...]
-----END CERTIFICATE-----
&amp;lt;/ca&amp;gt;
&amp;lt;cert&amp;gt;
-----BEGIN CERTIFICATE-----
[...]
-----END CERTIFICATE-----
&amp;lt;/cert&amp;gt;
&amp;lt;key&amp;gt;
-----BEGIN PRIVATE KEY-----
[...]
-----END PRIVATE KEY-----
&amp;lt;/key&amp;gt;&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Andr&amp;eacute;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSL VPN : Site-to-Site SSL and Remote Access SSL VPN : Ubiquiti EdgeOS as Client</title><link>https://community.sophos.com/thread/477678?ContentTypeID=1</link><pubDate>Thu, 09 Sep 2021 18:59:46 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:26a8cd29-1ab1-445c-8500-7c9045b70691</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Hallo&amp;nbsp;&lt;span&gt;Andr&amp;eacute;,&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;I usually use UDP 443 for SSL VPN, both S2S and Remote Access.&amp;nbsp; UDP makes the tunnels faster than using TCP.&amp;nbsp; Because of Google using UDP 443, packets using that port are not blocked by any European ISP that I&amp;#39;ve heard of.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;I&amp;#39;ve used TCP 1443 for SSL VPN in the past, but that was just to keep those tunnels clearly separated from any DNATs, and Web Server Protection where TCP 443 is what the world expects.&amp;nbsp; In the same vein, I usually configure the User Portal on TCP 2443.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;If you have distinct, non-overlapping subnets, you don&amp;#39;t need transfer nets as described in&amp;nbsp;&lt;u&gt;&lt;a href="https://support.sophos.com/support/s/article/KB-000034290?language=en_US" rel="noopener noreferrer" target="_blank"&gt;&lt;span style="font-family:Verdana, sans-serif;"&gt;&lt;span style="font-size:small;"&gt;How to tunnel between two UTMs which use the same LAN network range&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;I&amp;#39;ve not had a client need to do this, so I didn&amp;#39;t keep a record of a recommended way to solve this problem.&amp;nbsp; If you search here, you&amp;#39;ll find several answers.&amp;nbsp; My preference is for IPsec using X509 authentication:&amp;nbsp;&lt;u&gt;&lt;a href="https://support.sophos.com/support/s/article/KB-000037104?language=en_US&amp;amp;c__displayLanguage=en_US" rel="noopener noreferrer" target="_blank"&gt;&lt;span style="font-family:Arial, sans-serif;"&gt;&lt;span style="font-size:small;"&gt;&lt;span&gt;How to create an IPsec Site-to-Site VPN with X509 authentication&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;This is basically the same quest as 4.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span&gt;Cheers - Bob&lt;br /&gt;PS One of the unwritten rules practiced here is &amp;quot;One topic per thread&amp;quot; as that makes it easier for others to find answers without having to start their own thread.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>