<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vpn Archives - Network Guy</title>
	<atom:link href="https://networkguy.de/tag/vpn/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Tue, 14 Mar 2023 12:24:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>vpn Archives - Network Guy</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Sophos UTM how to setup a site to site vpn with dynDNS</title>
		<link>https://networkguy.de/sophos-utm-how-to-setup-a-site-to-site-vpn-with-dyndns/</link>
					<comments>https://networkguy.de/sophos-utm-how-to-setup-a-site-to-site-vpn-with-dyndns/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 18:53:47 +0000</pubDate>
				<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[sophos utm]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2362</guid>

					<description><![CDATA[<p>Hello guys, today I will talk about how you can setup a site to site VPN with 2 Sophos UTM and dynDNS. The logical network structure For a better understanding I have create a little grafic with the logical network structure. The UTMs stands behind a ISP Router with a private transfer LAN IP and [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-how-to-setup-a-site-to-site-vpn-with-dyndns/">Sophos UTM how to setup a site to site vpn with dynDNS</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys,</p>
<p>today I will talk about how you can setup a site to site VPN with 2 Sophos UTM and dynDNS.</p>
<p><strong>The logical network structure</strong></p>
<p>For a better understanding I have create a little grafic with the logical network structure.<br />
The UTMs stands behind a ISP Router with a private transfer LAN IP and the routers have no static WAN IP.<br />
Only router A is available via dynDNS.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2.jpg"><img fetchpriority="high" decoding="async" class="alignnone wp-image-2385" src="https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2-300x124.jpg" alt="" width="660" height="273" srcset="https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2-300x124.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2-1024x424.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2-768x318.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2-1536x636.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/SitetoSiteLogicalNetwork2.jpg 1987w" sizes="(max-width: 660px) 100vw, 660px" /></a></p>
<p>&nbsp;</p>
<p><strong>preparatory work on the ISP routers</strong></p>
<p>Before we can create a Site to Site VPN tunnel, we must create a portforwarding roule on ISP Router A. OK, and way do we not need a portforwarding rule for the ISP Router B? Site B have not a dynDNS and because this, UTM A do not known the actual WAN IP from Router B and is not able to initiate a tunnel to UTM B. Only UTM B is able to initiate a VPN tunnel to Site A.</p>
<p>In this example i have a router from AVM which is widely used in Germany. The router has a function named &#8220;Exposed Host&#8221;. This is a portforwarding rule to send all incoming traffic from all ports to the configured host. Except ports for router&#8217;s own services or expected response packets from other clients in the transfer LAN (10.192.178.0/24) which are handled by the router stateful inspection firewall.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-scaled.jpg"><img decoding="async" class="alignnone wp-image-2367" src="https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-300x62.jpg" alt="" width="755" height="156" srcset="https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-300x62.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-1024x211.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-768x158.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-1536x316.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/FritzboxExposedHost-2048x421.jpg 2048w" sizes="(max-width: 755px) 100vw, 755px" /></a></p>
<p>&nbsp;</p>
<p><strong>dynDNS</strong></p>
<p>Because we are in the unbelievable situation of not having fixed WAN IP addresses, we have to use dynDNS. You can use a dynDNS service from the ISP Router or from the UTM. In my case I have use the dynDNS service from my UTM and as dynDNS provider the German Strato AG.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/DynDNSSetting.jpg"><img decoding="async" class="alignnone size-large wp-image-2966" src="https://networkguy.de/wp-content/uploads/2020/10/DynDNSSetting-1024x647.jpg" alt="" width="800" height="505" srcset="https://networkguy.de/wp-content/uploads/2020/10/DynDNSSetting-1024x647.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/DynDNSSetting-300x190.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/DynDNSSetting-768x485.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/DynDNSSetting.jpg 1245w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>&nbsp;</p>
<p><strong>build the tunnel</strong></p>
<p>OK, now we can build the VPN tunnel. For a site to site VPN tunnel is IPSec the recommended solution. And please to not use a PSK for authentication. A RSA key or a X509 certificate is the more adult solution. The use of PSKs is out of date.<br />
I use the RSA key.</p>
<ul>
<li><strong>create a policy</strong></li>
</ul>
<p>First you must create a policy. The policy must be identical on boot sites. This is a problem I have often encountered in my everyday life:)</p>
<p>example policy<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMExampleVPNPolicy.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2370" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMExampleVPNPolicy-300x257.jpg" alt="" width="466" height="400" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMExampleVPNPolicy-300x257.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMExampleVPNPolicy-768x658.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMExampleVPNPolicy.jpg 883w" sizes="(max-width: 466px) 100vw, 466px" /></a></p>
<ul>
<li><strong>Edit the local RSA Key</strong></li>
</ul>
<p>For our VPN tunnel we must edit the RSA Key settings. For VPN ID you must set hostname enter the UTM hostname under VPN ID.</p>
<p>Site A</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2371" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey-300x196.jpg" alt="" width="592" height="387" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey-300x196.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey-1024x670.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey-768x503.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey-1536x1005.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey-2048x1340.jpg 2048w" sizes="(max-width: 592px) 100vw, 592px" /></a></p>
<p>Site B</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2372" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2-300x210.jpg" alt="" width="586" height="410" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2-300x210.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2-1024x716.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2-768x537.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2-1536x1074.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMRSAKey2-2048x1432.jpg 2048w" sizes="(max-width: 586px) 100vw, 586px" /></a></p>
<ul>
<li><strong>Remote Gateway Settings</strong></li>
</ul>
<p>Now we must create the Remote Gateway on both sites. Enter the public RSAkey in the other Sophos UTM and act on the correct VPN ID. Site A will be set to answer only and site B to initiate connection.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-scaled.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2374" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-300x102.jpg" alt="" width="683" height="232" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-300x102.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-1024x350.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-768x262.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-1536x524.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNGateway-2048x699.jpg 2048w" sizes="(max-width: 683px) 100vw, 683px" /></a></p>
<ul>
<li><strong>Connections</strong></li>
</ul>
<p>Now we have to do the last adjustments for the vpn tunnel. I don&#8217;t recommend to use the auto firewall rules, because they allow Any and in our example, we also have a DMZ server that should be accessible via VPN. And Any would not be so cool here.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-scaled.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2375" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-300x113.jpg" alt="" width="676" height="255" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-300x113.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-1024x386.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-768x289.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-1536x579.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNConnection-2048x772.jpg 2048w" sizes="(max-width: 676px) 100vw, 676px" /></a></p>
<ul>
<li><strong>Turn on the tunnel</strong></li>
</ul>
<p>OK, now we can activate the VPN tunnel on both sites and can see it comes up.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-scaled.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2390" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-300x152.jpg" alt="" width="422" height="214" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-300x152.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-1024x517.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-768x388.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-1536x776.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMVPNOverview2-2048x1035.jpg 2048w" sizes="(max-width: 422px) 100vw, 422px" /></a></p>
<p>&nbsp;</p>
<p><strong>Create the firewall rules</strong></p>
<p>Now the tunnel is online but the firewall rules are still missing.</p>
<p>Example firewall rules Site A</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMexampleFirewallRules.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2378" src="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMexampleFirewallRules-300x100.jpg" alt="" width="420" height="140" srcset="https://networkguy.de/wp-content/uploads/2020/10/SophosUTMexampleFirewallRules-300x100.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMexampleFirewallRules-1024x341.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMexampleFirewallRules-768x256.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/SophosUTMexampleFirewallRules.jpg 1178w" sizes="(max-width: 420px) 100vw, 420px" /></a></p>
<p>&nbsp;</p>
<p><strong>Test the connection</strong></p>
<p>Ping is not a good test. If it is possible test the seperate needed services. ICMP is treated separately in the UTM and can easily lead you on the wrong track. I like to use the tool tcping.exe</p>
<p>Test from my client 192.168.0.53 to a Linux server 192.168.20.10 with port 22 ssh.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/10/VPNConnectionTest.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2379" src="https://networkguy.de/wp-content/uploads/2020/10/VPNConnectionTest-300x124.jpg" alt="" width="407" height="168" srcset="https://networkguy.de/wp-content/uploads/2020/10/VPNConnectionTest-300x124.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/VPNConnectionTest.jpg 721w" sizes="(max-width: 407px) 100vw, 407px" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/sophos-utm-how-to-setup-a-site-to-site-vpn-with-dyndns/">Sophos UTM how to setup a site to site vpn with dynDNS</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-how-to-setup-a-site-to-site-vpn-with-dyndns/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2362</post-id>	</item>
	</channel>
</rss>
