10 Remote Access1,3
10 Remote Access1,3
Sophos Firewall
Version: 19.0v1
[Additional Information]
Sophos Firewall
FW5005: Getting Started with Remote Access VPNs on Sophos Firewall
April 2022
Version: 19.0v1
© 2022 Sophos Limited. All rights reserved. No part of this document may be used or reproduced
in any form or by any means without the prior written consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and
marks mentioned in this document may be the trademarks or registered trademarks of Sophos
Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no
warranties, conditions or representations (whether express or implied) as to its completeness or
accuracy. This document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at
The Pentagon, Abingdon Science Park, Abingdon, Oxfordshire, OX14 3YP.
In this chapter you will learn how RECOMMENDED KNOWLEDGE AND EXPERIENCE
to configure SSL and IPsec ✓ Protocols used for VPN access
remote access VPNs on Sophos ✓ Authentication servers, users and groups
Firewall.
DURATION
20 minutes
In this chapter you will learn how to configure SSL and IPsec remote access VPNs on Sophos
Firewall.
IPsec SSL
Establish remote access IPsec Establish remote access SSL
VPNs using the Sophos VPNs using the Sophos
Connect client or third-party Connect client, legacy SSL VPN
clients client, or OpenVPN clients
Sophos Firewall supports a range of common protocols for remote access VPNs.
The most used are IPsec and SSL, so in this chapter we will focus on these two, but it is useful to
remember that Sophos Firewall also supports L2TP over IPsec, which is compatible with the
Windows built-in VPN client, and PPTP, although we do not recommend you use it as it is less
secure.
• Sophos Connect VPN Client for Windows • Sophos Connect VPN Client for Windows
and Mac OS X and Mac OS X
• Compatible with OpenVPN clients on all • Compatible with third-party IPsec VPN
platforms clients
• Split tunnelling and tunnel all • Split tunnelling and tunnel all
Sophos Firewall’s SSL remote access VPN is based on OpenVPN, a full-featured VPN solution. The
encrypted tunnels between remote devices and the Sophos Firewall use both SSL certificates and
username and password to authenticate the connection, and you can also enable multi-factor
authentication for additional security.
The IPsec remote access VPN can be authenticated using a pre-shared key or digital certificate,
with users then authenticating with their username and password, and optionally multi-factor
authentication. As a standard IPsec VPN, it is compatible with third-party VPN clients.
For both the SSL and IPsec remote access VPNs we provide the Sophos Connect VPN client for
Windows and Mac OS X devices.
For SSL remote access VPNs, we still support the legacy Sophos SSL VPN Client; however, we
recommend upgrading to Sophos Connect when possible.
[Additional Information]
https://docs.sophos.com/nsg/sophos-firewall/18.5/Help/en-
us/webhelp/onlinehelp/nsg/sfos/concepts/VPNSophosConnectClient.html
Sophos Firewall has a wizard to streamline and simplify the configuration of everything required
for remote access SSL VPNs. The assistant includes:
• Selecting the users and groups the policy will apply to
• Configuring the authentication servers
• Selecting the resources users will be able to access
• Choosing between split tunneling or tunnel all
• Selecting which zones can access the user portal to download the client and configuration
• And selecting which zones users can establish an SSL VPN from
As part of the assistant, a firewall rule will be created to control access to internal resources from
the VPN.
https://training.sophos.com/fw/demo/SslVpnAssistant/1/play.html
In this demo you will see how to use the SSL VPN assistant to quickly configure remote access for
users.
[Additional Information]
https://training.sophos.com/fw/demo/SslVpnAssistant/1/play.html
In this short demo we will look at the SSL VPN assistant, which brings together the configuration of
the VPN profile, creation of a firewall rule, as well as several global settings, to make setting up SSL
VPNs quick and easy.
The SSL VPN assistant is launched from the Remote access VPN section on the SSL VPN tab.
The first screen here gives you an overview of some of the global SSL VPN settings. These can be
configured using the SSL VPN global settings link here.
Give the VPN a name, then select the users and groups that can use this connection. I will select
the Training group here.
Next, you can customize the authentication servers for SSL VPNs. I will remove local
authentication. This setting is global for SSL VPNs, and if you need to update it you will find it in
Authentication > Services.
Select the resources you want users to be able to access through the VPN. This will be used to
configure a firewall rule.
Select which zones can access the user portal, where users can download the SSL
VPN client and configuration files. Note that this is a global setting that can be found
in Administration > Device access.
Finally, select from which zones users can establish SSL VPNs from. This is also a
global setting in device access.
In addition to creating the SSL VPN configuration you can see here; the assistant also
created a firewall rule to limit the scope of access for VPN users to the resources
selected.
To enable using the Security Heartbeat over the SSL VPN, you need to add the built-in
‘SecurityHeartbeat_over_VPN’ host object. This contains the public IP address used for Security
Heartbeat and will ensure it is routed over the VPN to Sophos Firewall.
By default, Sophos Firewall hosts the SSL VPN on port 8443, however this can be changed to a
different available port in the SSL VPN settings. Note that the SSL VPN can share port 443 with
other services on Sophos Firewall, such as the user portal and web application firewall rules.
You can modify the SSL certificate for the connection and override the hostname used in the
configuration files.
You can configure the IP lease range, DNS, WINS and domain name that will be used for clients that
connect.
In addition to this, there are several advanced connection settings such as the algorithms, key size,
key lifetime and compression options.
The SSL VPN settings are global for both remote access and site-to-site SSL VPNs; if you make
changes here you may need to update any SSL site-to-site VPNs you have configured.
Once an SSL VPN profile has been created for a user, they can download an SSL VPN client from
their User Portal. For Windows and Mac OS X we recommend using the Sophos Connect client.
There is also a legacy SSL VPN Client for Windows, and configuration download for all platforms.
If the legacy SSL VPN client is not installed in the default location the
Sophos Connect installer will not detect it
The legacy SSL VPN client and Sophos Connect client cannot be installed on the same computer as
they will conflict with each other. To prevent this, when installing Sophos Connect it will check for
the legacy VPN in the default installation path and display an error if found.
If the legacy SSL VPN client has been installed to a non-default location the Sophos Connect
installer will not detect it. This may render both VPN clients inoperable due to the conflict.
[Additional Information]
The default installation path of the legacy SSL VPN client is: C:\Program Files (x86)\Sophos\Sophos
SSL VPN)
https://training.sophos.com/fw/simulation/SslUserVpn/1/start.html
In this simulation you will configure an SSL remote access VPN using the assistant. You will then
review the configuration created and test your VPN using the Sophos Connect client.
[Additional Information]
https://training.sophos.com/fw/simulation/SslUserVpn/1/start.html
Quick links to IPsec profile, Sophos Connect client download, and logs
At the top of the tab for the IPsec remote access VPN are quick links that provide access to IPsec
profiles, the Sophos Connect client download, and logs.
IPsec profiles contain the security configuration for the IPsec connection, such as the encryption
algorithms that will be supported.
Sophos Firewall provides a default profile for remote access; however, you can clone this and
create your own to meet your security requirements.
Pre-shared keys or
digital certificate
To configure the IPsec remote access VPN, start by enabling it and selecting which interface it will
listen for connections on.
The VPN can be authenticated by either pre-shared keys or with a digital certificate.
Select the users and groups that will be able to authenticate to use the VPN.
DNS servers
You need to configure the IP range that will be used for clients that connect, and optionally you can
also assign DNS servers.
The advanced configuration can be found at the bottom of the page and allows you to configure
split tunneling, two-factor authentication, Security Heartbeat, and other connection settings.
Using the buttons at the bottom of the page you can export the configuration for the VPN.
When you export the configuration from the web admin you will download an archive with two
files:
• .scx – that includes the advanced settings
• .tbg – which only contains the basic configuration and tunnels all traffic back to the Sophos
Firewall
The Sophos Connect client can also be downloaded from the user portal; however, the
configuration for the IPsec VPN needs to be provided by the admin.
To use the Sophos Connect client you need to import a configuration file. This can be either for the
IPsec or SSL VPN.
When the Sophos Connect Client contacts the firewall, you will be prompted to authenticate.
https://training.sophos.com/fw/simulation/IpsecUserVpn/1/start.html
In this simulation you will configure an IPsec remote access VPN. You will then test your VPN using
the Sophos Connect client.
[Additional Information]
https://training.sophos.com/fw/simulation/IpsecUserVpn/1/start.html
The Sophos Connect client can be easily deployed using Active Directory Group Policy. This requires
two elements to be configured.
First, you need to add the Sophos Connect MSI via a GPO, or group policy Object, script.
Secondly, you need to configure a Windows Settings file to push the configuration to the
endpoints.
[Additional Information]
The VPN assistant streamlines the configuration of everything required for remote
access SSL VPNs
The default port for SSL VPNs is 8443. This can be changed in the SSL VPN settings.
These settings are global and apply to site-to-site SSL VPNs
The Sophos Connect client supports both IPsec and SSL VPNs and can be downloaded
from both the web admin and user portal. The SSL VPN configuration is downloaded in
the user portal, whereas the IPsec VPN configuration is downloaded in the web admin
The VPN assistant streamlines the configuration of everything required for remote access SSL
VPNs.
The default port for SSL VPNs is 8443. This can be changed in the SSL VPN settings. These settings
are global and apply to site-to-site SSL VPNs.
The Sophos Connect client supports both IPsec and SSL remote access VPNs and can be
downloaded from both the web and user portal. The SSL VPN configuration is downloaded in the
user portal, whereas the IPsec VPN configuration is downloaded in the web admin.
Sophos Firewall
Version: 19.0v1
[Additional Information]
Sophos Firewall
FW5020: Configuring Clientless Access on Sophos Firewall
April 2022
Version: 19.0v1
© 2022 Sophos Limited. All rights reserved. No part of this document may be used or reproduced
in any form or by any means without the prior written consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and
marks mentioned in this document may be the trademarks or registered trademarks of Sophos
Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no
warranties, conditions or representations (whether express or implied) as to its completeness or
accuracy. This document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at
The Pentagon, Abingdon Science Park, Abingdon, Oxfordshire, OX14 3YP.
DURATION
8 minutes
In this chapter you will learn how to create and manage bookmarks for clientless SSL VPN access.
Clientless SSL VPN connections can be found in the user portal and can be used to provide access
to internal resources without the need for a VPN client to be installed. They are in the VPN section
and will appear below any IPsec and SSL VPNs that have been enabled for the user.
This form of remote access is most useful for providing IT staff with access to internal systems
without exposing them directly to the Internet. For example, providing access to TELNET, SSH, and
RDP, so that IT staff can securely administer key pieces of infrastructure remotely.
Other examples for using this include providing special access for a user to a specific machine with
RDP, often for accounting or finance, or access to timesheets, client tracking, web-based ticking
systems and so forth.
Protocols
• RDP
• TELNET
• SSH
• FTP/FTPS
• SMB
• VNC
When you create the bookmarks, start by selecting the protocol in the ‘Type’ field, this will change
the remaining fields that need to be completed. Bookmarks can be created for: RDP, TELNET, SSH,
FTP, SMB, and VNC.
You can choose to enable automatic login for the bookmark, where you can provide a username
and password that will be used to connect to the resource. This will not be the username and
password for the person using the bookmark in the user portal.
It is important to note that each bookmark represents a session to a resource, so if you wanted to
give five people access to a resource, you would create a bookmark for each. You can enable
session sharing, which means that two users can use the bookmark at the same time, but there
will still only be a single session.
You can also create bookmark groups, which can then be used to assign multiple bookmarks in a
policy.
Once the bookmarks have been created, and optionally added to bookmark groups, they need to
be assigned to a specific user or group using a policy. This simple policy has just three settings:
• A name for the policy
• The users and groups the policy applies to
https://training.sophos.com/fw/simulation/ClientlessVpn/1/start.html
In this simulation you will configure bookmarks and policies for clientless SSL VPN access. You
will then login to the user portal to test your configuration.
[Additional Information]
https://training.sophos.com/fw/simulation/ClientlessVpn/1/start.html
Clientless SSL VPN provides access to internal resources through bookmarks in the VPN
section of the user portal
Bookmarks can be created for: RDP, TELNET, SSH, FTP, SMB, and VNC. Each bookmark is
a single session for that resource
Clientless SSL VPN provides access to internal resources through bookmarks in the VPN section of
the user portal.
Bookmarks can be created for: RDP, TELNET, SSH, FTP, SMB, and VNC. Each bookmark is a single
session for that resource.