You can configure IPsec remote access connections. Users can establish the connection using the Sophos Connect client.
OpenVPN Cloud / OpenVPN-as-a-Service Simplify networking with OpenVPN-as-a-Service. Utilize our next-gen service for your private networking, powered by a multi-tenant, mesh-connected, high-speed core network with worldwide points of presence. Dynamically add and manage networks and users from an administration portal. Some of the things that I’ve seen at work, is that Sophos UTM VPN users are using one token for Sophos SSLVPN and another for ex. Office 365 services. Both tokens can be in Microsoft Authenticator, but only the one that Office 365 is using, can do the “pop-up”, letting the user easy sign-in, like this.
The Sophos Connect client allows you to enforce advanced security and flexibility settings, such as connecting the tunnel automatically. To configure and establish IPsec remote access connections over the Sophos Connect client, do as follows:
Users must do as follows:
Setting | |
---|---|
Interface | Select a WAN port. |
Authentication type | Specify a preshared key or the local and remote certificates. |
Local ID Remote ID | Specify the IDs if required. |
Allowed users and groups | Select the users and groups you want to allow. |
Setting | |
---|---|
Name | TestRemoteAccessVPN |
Assign IP from | 192.168.1.11 192.168.1.254 |
DNS server 1 | 192.168.1.5 |
Setting | |
---|---|
Permitted network resources (IPv4) | LAN_10.1.1.0 DMZ_192.168.2.0 |
Send Security Heartbeat through tunnel | Kerovee fl studio. Sends the Security Heartbeat of remote clients through the tunnel. |
Allow users to save username and password | Users can save their credentials. |
The exported tar.gz file contains a .scx file and a .tgb file.