Issue with Setting up VPN Connection between UTM Sophos Firewall V9 and AWS VPC

0

Hey everyone,

I've been trying to set up a VPN connection between my UTM Sophos Firewall V9 and AWS VPC, but I've run into some issues. I hope someone can help me troubleshoot this problem.

Here's what I've done so far:

In the AWS console, I created a VPN connection with dynamic routing, specifying the appropriate VPC and subnets.

On the UTM Sophos Firewall V9 side, I added the AWS IAM credentials, including the access key and secret access key.

I downloaded the VPC configuration file from the VPN connection page in AWS, specifically tailored for the UTM Sophos Firewall V9 vendor.

Now, here's the issue I'm encountering:

The VPN tunnels are successfully established on both the UTM Sophos Firewall V9 and AWS VPC sides. However, when I try to ping resources across the VPN, I'm not receiving any response.

To further investigate, I've checked the firewall rules on both the AWS and Sophos Firewall sides, and they appear to be correctly configured. I ensured that the necessary traffic is allowed through the firewall rules for the VPN connection. I've checked the route tables as well, and they are correctly configured.

At this point, I'm uncertain about what could be causing the lack of response to the ping requests. I'm wondering if there are additional settings or configurations that need attention to resolve this issue.

If anyone has experience with setting up a VPN connection between UTM Sophos Firewall V9 and AWS VPC, I would greatly appreciate any insights, suggestions, or troubleshooting tips you can provide. What else can I check or configure to enable successful communication over the VPN?

Thank you in advance for your assistance!

1개 답변
0
수락된 답변

You can enable VPC flow logs and then see if the ICMP traffic is reaching that EC2, if you see the traffic there then and if it's been allowed (You would see that in the VPC flow logs), then make sure there is return traffic in the VPC flow logs.

Here is how to enable VPC flow logs https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html

  1. If you don't see traffic reaching the EC2, then make sure of the routing on your Sophos Firewall has a route to send traffic to AWS.
  2. If you see the traffic is reaching the EC2, if it's being denied then make sure to allow the traffic in the security group.
  3. If you see the traffic is reaching the EC2, and is being allowed but no return traffic, then make sure of the subnet route table that it has a route for your on-prem CIDR pointed to the Virtual gateway/ or the Transit Gateway.

A few other points, make sure you're not running into multiple security associations issue https://repost.aws/knowledge-center/vpn-connection-instability If you're using transit gateway, then make sure you have a route for on-prem in the TGW route table.

profile pictureAWS
Matt_E
답변함 일 년 전
profile pictureAWS
전문가
검토됨 일 년 전
  • Hello Matt,

    Thanks to your instructions, the VPN is now working flawlessly. I sincerely appreciate your assistance in resolving this issue.

    Thank you once again!

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인