by
Etienne Liebetrau
In this article, I am going to cover the supported configuration for IPSec site-to-site VPN connections between Sophos UTM (SG) and Sophos XG firewalls.
The main limitation to understand is that site-to-site VPNs are only supported when Sophos UTM (SG) is the initiator, and Sophos XG is the respondent. This may change in the future, but it is certainly the case at the time of writing (January 2018) with SFOS 17.0.3 MR3 and SG 9.506-2.
This is a particular issue if you have NAT on one end but not the other. Typically NAT-T supports the initiator being behind a NAT, but not the respondent. If your central deployment is on Sophos UTM SG (on a fixed public IP), and your branches are on Sophos XGs behind NAT, then Site-to-Site VPNs are not going to work for you.
With that caveat outlined, let's look at how to configure IPSec Site-to-Site VPN connections between your Sophos UTM (SG) and Sophos XG devices.
Let's start by configuring the Sophos UTM (SG) to initiate the connection to the Sophos XG, and allow traffic in and out.
First, you need to explicitly define the networks that will exist on either end of the VPN tunnel.
The policy is used to negotiate how the two firewalls secure the connection. Go to Site-to-Site VPN | IPsec |Policies | +New and create a new policy with the following settings:
Now we need to define the Sophos XG that our Sophos UTM (SG) will connect to. Go to Site-to-Site VPN | IPsec | Remote Gateways | +New Remote Gateway and create a remote gateway with the following settings:
This is the portion that will invoke the connection to the XG. Go to Site-to-Site VPN | IPsec | + New IPsec Connection and create a new connection with the following settings:
Now turn on the IPsec connection by going to Site-to-Site VPN | IPsec and toggle the switch to turn it on.
The VPN establishes the connection and adds the routing but it does not define the types of traffic that are allowed or blocked. For that, we are going to define two basic rules; one to allowed inbound traffic and another to allow outbound traffic.
To allow inbound traffic, go to Network Protection | Firewall | + New Rule and add a new rule with the following settings:
Toggle the switch to turn on the rule.
To allow outbound traffic, go to Network Protection | Firewall | + New Rule and add a new rule with the following settings:
Toggle the switch to turn on the rule.
Now that the Sophos UTM (SG) has been configured to initiate the site-to-site VPN connection to the Sophos XG, we can configure the Sophos XG to accept and allow the connection as well.
First, you need to explicitly define the networks that will exist on either end of the VPN tunnel.
Next, configure a corresponding IPsec policy to match the Sophos SG side. Go to Configure | VPN | … | IPsec Policies, and add a new policy with the following settings:
To set up the VPN Connection on Sophos XG, you can use the Wizard. Go to VPN | IPSEC Connections | Wizard and create a connection with the following settings.
Authentication Details:
Local Networks:
Remote Subnet:
*Allow NAT Traversal is greyed out – it is automatically adjusted and enabled if required.
Review the settings and Finish:
In the IPSec Connections, click the Active red icon to enable it. It should turn green immediately and the connection indicator should go green within 20-30 seconds.
Depending on your deployment you might want granular controls on one side and relaxed firewall rules on the other. I prefer to keep them in sync. Again, let's define two basic rules; one to allowed inbound traffic and another to allow outbound traffic.
To allow outbound traffic, go to Firewall | +Add firewall Rule and add a new rule with the following settings:
To allow inbound traffic, go to Firewall | +Add firewall Rule and add a new rule with the following settings:
You should see that the site-to-site VPN connection is up on both the Sophos XG and Sophos UTM (SG) sides, and you should be able to send and receive traffic from either side of the tunnel. In this case, I am sending a ping from one network to the other.
IPSec site-to-site VPN connection, success!
Sophos has been making great progress in maturing the Sophos XG platform. It is now a serious contender for deployment instead of the more established Sophos UTM (SG) platform.
There will be a level of crossover as your environment moves from the one platform to the other. But know there is no rush for this process to start. Sophos has stated on numerous occasions that it is dedicated to supporting Sophos UTM (SG) for years to come. However, newer features on the Sophos XG make it more compelling to shift.
Having IPSec site-to-site VPN connectivity between Sophos SG and Sophos XG is a key capability for organizations looking to migrate from the older to the newer Sophos platform. Thus awareness of the current limitations can help you plan for such a project.
Download our FREE 30-day trial, or schedule a demo and we'll show you how it works.
A Simple Guide To Deploying A Site To Site VPN Using Sophos UTMs
Sophos SG and Amazon VPC VPN Setup and Testing Guide