This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Additional Public IP Required?

I currently use waf for owa and active sync; all working well using https. I have a new request to allow access to a remote desktop gateway which also uses https but of course a different certificate and internal server. Question - is a second public ip going to be required because both are using https? Wasn't sure if each having different certs with different domain names on the certs would be sufficient. 

One other question - I presume that if I decided to not use waf but a dnat rule instead for the RD Gateway that an additional ip would be required. Even with that wouldn't that break the waf rule for owa/active sync since the dnat rule would be used first (listening for https requests) when users tried using owa or active sync and be directed to the RD Gateway server?

Thanks


This thread was automatically locked due to age.
Parents
  • While changing the SSL VPN configuration, change it to UDP, too.  That will make it faster.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • While changing the SSL VPN configuration, change it to UDP, too.  That will make it faster.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
  • Any suggestions for a good alternative port that is almost universally acceptable across ISPs and firewalls?  I believe OpenVPN uses 1194 - but I also know that some intentionally block that port to prevent alternative VPNs.