0

I am new here and also new to Sophos XG firewalls and to Azure nor am I a network expert, which might not be a good combination. On the bright side, there might be something very easy that I have missed :)

I have followed this guide to make a connection from a Sophos XG firewall to Azure: https://community.sophos.com/kb/en-us/127546

Both the Sophos and Azure says the tunnel is up and running and I have found out by accident that I am able to ping two IP-adresses in the GatewaySubnet from both the on-premises network and from the VM.

But I am not able to ping from the Azure VM to any IP on the Sophos network, nether can I ping the VM from any client or from the Sophos. I have also tried to use RDP from both networks, but that did not work either.

One thing that probably is worth mentioning is that the VM at first only had one NIC, that both had an internal and external IP. What I did was adding a second subnet in the VMs vnet:

SERVER1-vnet

default 10.0.7.0/24 250

Second_NIC_subnet 10.0.8.32/27 26

GatewaySubnet 10.0.8.0/28 10

Then added a second NIC to the VM.

So, more precisely, I am able to ping 10.0.8.4 and 10.0.8.5 from the VM. I am also able to ping 10.0.8.4 and 10.0.8.5 from the on-premises network. Guess that it could be some kind of routing issue. I have tried both of these on the VM, but they seem kind of off:

route add -p 192.168.1.0 mask 255.255.255.0 10.0.8.4

route add -p 192.168.1.0 mask 255.255.255.0 10.0.8.5

This did not make any difference and I do not actually know how the GatewaySubnet works. Seems it would be easier with just one IP? With several addresses in the GatewaySubnet, to me it seems like the route should be something like this, but that can’t be right :)

route add -p 192.168.1.0 mask 255.255.255.0 10.0.8.0/28

What would be the prober way to continue the troubleshooting?

rulle
  • 3
  • 2

2 Answers2

0

I would start by trying Network Watcher's IP Flow verify - it will tell you if your traffic is blocked by firewall rules or misconfigured routes https://docs.microsoft.com/en-ca/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem

Make sure your User-Defined routes in the vNet allow conection to/from 192.168.x and 10.0.x

0

Keep it simple and remove the second NIC, you don’t have to do any routing inside the vNET but you need to route everything inside the subnet which gateway to use when the traffic is going to your on-premise networks.

https://docs.microsoft.com/en-us/azure/virtual-network/tutorial-create-route-table-portal

RouteName: Route2Onprem

Addressprefix: 192.168.1.0/24

Next hop type: Virtual appliance (Tunnel/endpoint pointing towards on-Prem)

And as Garcia stated, use network watcher to verify and troubleshoot. It’s a great set of tools for these scenarios.

Jarnstrom
  • 705
  • 4
  • 9