Configure remote access SSL VPN with Sophos Connect client
You can configure remote access SSL VPN connections. Users can establish the connection using the Sophos Connect client.
Overview
The Sophos Connect client allows you to enforce advanced security and flexibility settings, such as connecting the tunnel automatically.
Preliminary configurations:
- Configure IP hosts for the local subnets.
- Configure users and groups. Alternatively, configure an authentication server.
- Check the authentication methods.
To configure and establish remote access SSL VPN connections using the Sophos Connect client, do as follows:
- Configure the SSL VPN settings.
- Send the configuration file to users.
- Add a firewall rule.
- Send the Sophos Connect client to users. Alternatively, users can download it from the user portal.
Restriction
Currently, the Sophos Connect client doesn't support macOS for SSL VPN. It also doesn't support mobile platforms for IPsec and SSL VPN. For these endpoints, you can use the OpenVPN Connect client. See Sophos Connect client: Compatibility with platforms.
Users must do as follows:
- Install the Sophos Connect client on their endpoint devices.
- Import the configuration file into the client and establish the connection.
Create an IP host for local subnet
The local subnet defines the network resources that remote clients can access.
- Go to Hosts and services > IP host and click Add.
-
Enter a name and network for the local subnet.
-
Click Save.
Create a user group and add a user
You create a user group for the remote SSL VPN and add a user. The group specifies a surfing quota and access time. In this example, users in the group are allowed unlimited access.
- Go to Authentication > Groups and click Add.
-
Specify the settings.
Name Description Name Remote SSL VPN group Surfing quota Unlimited internet access Access time Allowed all the time -
Click Save.
- Go to Authentication > Users and click Add.
-
Specify the settings.
Name Description Username john.smith Name John Smith Group Remote SSL VPN group -
Click Save.
Check authentication services
In this example, you set the firewall and SSL VPN authentication methods to local authentication. Sophos Firewall then acts as the authentication server.
- Go to Authentication > Services.
-
Under Firewall authentication methods, check that the authentication server is set to Local.
Alternatively, you can select an authentication server, such as the Active Directory server you've configured under Authentication > Servers.
-
Scroll to SSL VPN authentication methods.
-
Check that the authentication server is set to Local.
Specify an IP address range for SSL VPN clients
When SSL VPN clients connect to Sophos Firewall, it assigns IP addresses from the address range you specify here. You must use a private address range.
-
Go to VPN and click Show VPN settings.
-
Specify a lease range. If required, you can also update the subnet mask.
-
Click Apply.
Add an SSL VPN remote access policy
You create a policy that allows users in the Remote SSL VPN group to connect. These users are allowed to access resources on the local subnet.
- Go to VPN > SSL VPN (remote access) and click Add.
-
Enter a name and specify policy members and permitted network resources.
-
Click Apply.
Add a firewall rule
- Go to Rules and policies > Firewall rules.
- Select IPv4 or IPv6.
- Click Add firewall rule and New firewall rule.
- Enter a rule name.
- For Source zone, select VPN.
-
For Source networks and devices, select ##ALL_SSLVPN_RW or ##ALL_SSLVPN_RW6.
These hosts contain the IP addresses leased to remote users who've established a connection.
-
For Destination zones, select the zones of the resources you want to give remote access to.
- For Destination networks, select the IP host you've created for the permitted network resources.
-
Click Save.
Here's an example:
Check device access settings
You must give access to some services for remote users from the required zones.
- Go to Administration > Device access.
-
Under SSL VPN, select WAN.
This allows remote users to establish SSL VPN connections.
-
Under User portal, select the following:
-
WAN and Wi-Fi: Users can access the user portal from the WAN and the internal Wi-Fi zone. They can then download the VPN client and configuration from the user portal. LAN is selected by default.
Allowing WAN access is a security risk.
-
VPN: After users establish a VPN connection, they can access the user portal through the VPN. You can then turn off access from WAN.
-
-
Optional: Under Ping/Ping6, select VPN.
Users can ping the firewall's IP address through VPN to check connectivity.
-
Optional: Under DNS, select VPN.
Users can resolve domain names through VPN if you've specified the firewall for DNS resolution in VPN settings.
-
Click Apply.
Install and configure Sophos Connect client on endpoints
To establish remote access SSL VPN connections, users must install the Sophos Connect client on their endpoint devices and import the .ovpn
file to the client.
You can download the Sophos Connect client installer from the Sophos Firewall web admin console and share it with users. Alternatively, users can download the Sophos Connect client from the user portal as follows:
- Sign in to the user portal.
- Click VPN.
-
Under Sophos Connect client, click Download for Windows.
Note
For information about which endpoint platforms the Sophos Connect client supports, see Sophos Connect client: Compatibility with platforms.
-
Click Download configuration for Windows, macOS, Linux to download the
.ovpn
configuration file. -
Click the Sophos Connect client.
You can then see it in the system tray of your endpoint device.
-
Click the three dots button in the upper-right corner, click Import connection, and select the
.ovpn
file you've downloaded. -
Sign in using your user portal credentials.