FW5005 20.0v1 Getting Started With Remote Access On Sophos Firewall
FW5005 20.0v1 Getting Started With Remote Access On Sophos Firewall
FW5005 20.0v1 Getting Started With Remote Access On Sophos Firewall
Sophos Firewall
Version: 20.0v1
[Additional Information]
Sophos Firewall
FW5005: Getting Started with Remote Access VPNs on Sophos Firewall
January 2024
Version: 20.0v1
© 2024 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any means without the prior written
consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this document may be the
trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or representations (whether express
or implied) as to its completeness or accuracy. This document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon Science Park, Abingdon,
Oxfordshire, OX14 3YP.
DURATION 20 minutes
In this chapter you will learn how to configure SSL and IPsec remote access VPNs on Sophos Firewall.
IPsec SSL
Establish remote access IPsec Establish remote access SSL
VPNs using the Sophos Connect VPNs using the Sophos Connect
client or third-party clients client, legacy SSL VPN client, or
OpenVPN clients
Sophos Firewall supports a range of common protocols for remote access VPNs.
The most used are IPsec and SSL, so in this chapter we will focus on these two, but it is useful to
remember that Sophos Firewall also supports L2TP over IPsec, which is compatible with the Windows
built-in VPN client, and PPTP, although we do not recommend you use it as it is less secure.
▪ Sophos Connect VPN Client for Windows and ▪ Sophos Connect VPN Client for Windows and
Mac OS X Mac OS X
▪ Compatible with OpenVPN clients on all ▪ Compatible with third-party IPsec VPN clients
platforms
▪ Support for multi-factor authentication
▪ Support for multi-factor authentication
▪ Supports Synchronized Security
▪ Supports Synchronized Security
▪ Split tunnelling and tunnel all
▪ Split tunnelling and tunnel all
Sophos Firewall’s SSL remote access VPN is based on OpenVPN, a full-featured VPN solution. The
encrypted tunnels between remote devices and the Sophos Firewall use both SSL certificates and
username and password to authenticate the connection, and you can also enable multi-factor
authentication for additional security.
The IPsec remote access VPN can be authenticated using a pre-shared key or digital certificate, with
users then authenticating with their username and password, and optionally multi-factor
authentication. As a standard IPsec VPN, it is compatible with third-party VPN clients.
For both the SSL and IPsec remote access VPNs we provide the Sophos Connect VPN client for
Windows and Mac OS X devices.
For SSL remote access VPNs, we still support the legacy Sophos SSL VPN Client; however, we
recommend upgrading to Sophos Connect when possible.
[Additional Information]
https://doc.sophos.com/nsg/sophos-firewall/20.0/help/en-
us/webhelp/onlinehelp/AdministratorHelp/RemoteAccessVPN/IPsecSSL/SophosConnect/RAVPNSConC
lient/index.html
Sophos Firewall has a wizard to streamline and simplify the configuration of everything required for
remote access SSL VPNs. The assistant includes:
• Selecting the users and groups the policy will apply to.
• Configuring the authentication servers.
• Selecting the resources users will be able to access.
• Choosing between split tunneling or tunnel all.
• Selecting which zones can access the user portal to download the client and configuration.
• And selecting which zones users can establish an SSL VPN from.
As part of the assistant, a firewall rule will be created to control access to internal resources from the
VPN.
In this demo you will see how to use the SSL VPN assistant
to quickly configure remote access for users.
https://training.sophos.com/fw/demo/SslVpnAssistant/1/play.html
Click Launch Demonstration to start. Once you have finished, click Continue.
[Additional Information]
https://training.sophos.com/fw/demo/SslVpnAssistant/1/play.html
To enable using the Security Heartbeat over the SSL VPN, you need to add the built-in
‘SecurityHeartbeat_over_VPN’ host object. This contains the public IP address used for Security
Heartbeat and will ensure it is routed over the VPN to Sophos Firewall.
By default, Sophos Firewall hosts the SSL VPN on port 8443, however this can be changed to a
different available port in the SSL VPN settings. Note that the SSL VPN can share port 443 with other
services on Sophos Firewall, such as the user portal and web application firewall rules.
You can modify the SSL certificate for the connection and override the hostname used in the
configuration files.
You can configure the IP lease range, DNS, WINS and domain name that will be used for clients that
connect.
In addition to this, there are several advanced connection settings such as the algorithms, key size, key
lifetime and compression options.
The SSL VPN settings are global for both remote access and site-to-site SSL VPNs; if you make changes
here you may need to update any SSL site-to-site VPNs you have configured.
Once an SSL VPN profile has been created for a user, they can download an SSL VPN client from their
VPN portal. For Windows and macOS we recommend using the Sophos Connect client. There is also
SSL VPN configuration downloads for all platforms and an IPsec VPN profile download for iOS.
https://training.sophos.com/fw/simulation/SslUserVpn/2/start.html
Click Launch Simulation to start. Once you have finished, click Continue.
[Additional Information]
https://training.sophos.com/fw/simulation/SslUserVpn/2/start.html
Quick links to IPsec profile, Sophos Connect client download, and logs
At the top of the tab for the IPsec remote access VPN are quick links that provide access to IPsec
profiles, the Sophos Connect client download, and logs.
IPsec profiles contain the security configuration for the IPsec connection, such as the encryption
algorithms that will be supported.
Sophos Firewall provides a default profile for remote access; however, you can clone this and create
your own to meet your security requirements.
To configure the IPsec remote access VPN, start by enabling it and selecting which interface it will
listen for connections on.
The VPN can be authenticated by either pre-shared keys or with a digital certificate.
Select the users and groups that will be able to authenticate to use the VPN.
DNS servers
You need to configure the IP range that will be used for clients that connect, and optionally you can
also assign DNS servers.
The advanced configuration can be found at the bottom of the page and allows you to configure split
tunneling, two-factor authentication, Security Heartbeat, and other connection settings.
Using the buttons at the bottom of the page you can export the configuration for the VPN.
When you export the configuration from the web admin you will download an archive with two files:
• .scx: that includes the advanced settings.
• .tbg: which only contains the basic configuration and tunnels all traffic back to the Sophos Firewall.
The Sophos Connect client can also be downloaded from the VPN portal; however, the configuration
for the IPsec VPN needs to be provided by the admin.
To use the Sophos Connect client you need to import a configuration file. This can be either for the
IPsec or SSL VPN.
When the Sophos Connect Client contacts the firewall, you will be prompted to authenticate.
https://training.sophos.com/fw/simulation/IpsecUserVpn/2/start.html
Click Launch Simulation to start. Once you have finished, click Continue.
[Additional Information]
https://training.sophos.com/fw/simulation/IpsecUserVpn/2/start.html
The Sophos Connect client can be easily deployed using Active Directory Group Policy. This requires
two elements to be configured.
First, you need to add the Sophos Connect MSI via a GPO, or group policy Object, script.
Secondly, you need to configure a Windows Settings file to push the configuration to the endpoints.
[Additional Information]
https://doc.sophos.com/nsg/sophos-firewall/20.0/Help/en-
us/webhelp/onlinehelp/AdministratorHelp/RemoteAccessVPN/IPsecSSL/SophosConnect/RAVPNSConC
lientGPOScript/index.html
Chapter Review
The VPN assistant streamlines the configuration of everything required for remote access SSL VPNs.
The default port for SSL VPNs is 8443. This can be changed in the SSL VPN settings. These settings are
global and apply to site-to-site SSL VPNs.
The Sophos Connect client supports both IPsec and SSL remote access VPNs and can be downloaded from
both the web admin console and user portal. The SSL VPN configuration is downloaded in the user portal,
whereas the IPsec VPN configuration is downloaded in the web admin console.
The VPN assistant streamlines the configuration of everything required for remote access SSL VPNs.
The default port for SSL VPNs is 8443. This can be changed in the SSL VPN settings. These settings are
global and apply to site-to-site SSL VPNs.
The Sophos Connect client supports both IPsec and SSL remote access VPNs and can be downloaded
from both the web and user portal. The SSL VPN configuration is downloaded in the user portal,
whereas the IPsec VPN configuration is downloaded in the web admin.