Set Primary Authentication Method for Sophos Services
Overview
- Resource: Configure Active Directory Authentication
- Upon adding an external Active Directory server and importing groups, the Active Directory server will need to be set as the primary authentication method on the Sophos Firewall for the services required
- When users sign in to the firewall for the first time, they're automatically added as a member of AD groups imported
- In this demonstration, I will be setting my Active Directory server as the primary authentication method for the following Sophos Firewall services
- VPN Portal
- User Portal
- VPN (IPsec/dial-in/L2TP/PPTP)
- SSL VPN
VPN Portal Authentication
User Portal Authentication
VPN (IPsec/dial-in/L2TP/PPTP) with Firewall Authentication
- Resources
- In this lab demonstration, I have a domain user located on each LAN (Corporate & Branch site) to test and verify IPsec S2S VPN & Firewall authentication via the Active Directory domain controller
- For the entirety of this lab demonstration of the section, I will be taking a closer look into configuring the Branch site domain user, 'Mudkip' for VPN authentication but the same configurations would apply to the Corporate domain user 'Charmander' accessing the Branch site LAN via the VPN
- Domain Users
- Corporate Site - 'Charmander' on the Helpdesk VLAN50 internal network
- Branch Site - 'Mudkip' on the Staff VLAN70 internal network
Sophos Client Authentication Agent
- The Sophos Client Authentication agent is a software application that allows users to authenticate directly with a Sophos Firewall by installing a client on their computer
- This enables the firewall to identify and manage user access based on their identity rather than just their IP address; providing a more granular level of network access control
- Users have the ability to install the client software via the User portal and shared amongst users. When users sign in to the client, they're signed directly into the network through the firewall
- The client authentication agent is supported on the following
- Windows 10 & later
- Linux: Ubuntu 16.4 & later
- macOS: Catalina (10.15) & later
Installing Sophos Client Authentication Agent
- In this demonstration, I will be installing the authentication agent on the Branch site PC for domain user 'Mudkip', a staff employee to authenticate to the Branch Sophos firewall to eventually access internal resources located at the Corporate site location via the IPsec S2S VPN
IPsec Firewall Rule & Authentication Configuration Overview
- In this demonstration, I will be demonstrating the inbound and outbound IPsec Firewall rules that will dictate what internal access to the Corporate LAN the authenticated Branch site domain users have via the IPsec S2S VPN
- In this demonstration, I will also be documenting the Sophos Firewall Authentication configurations including the active S2S VPN, the defined Active Directory server using LDAPS for communication between itself and the Sophos Firewall, the imported AD groups and a list of domain users that have authenticated to the Firewall, and lastly the primary Sophos authentication method for the 'Firewall' & 'VPN (IPsec)' services
Testing IPsec Firewall Rules via Active Directory Authentication
- In this demonstration, I will be testing the IPsec inbound and outbound Firewall rules by accessing the services defined in the rules
- In this demonstration, I will perform various tests from the Branch site authenticated AD user 'Mudkip'
- Pinging the Corporate site domain user 'Charmander' on the Helpdesk VLAN50 network over the S2S VPN
- Connecting to an accessible network share from the Windows DC1 server over the S2S VPN
- Establish an RDP connection to the Windows DC1 server located at the Corporate site LAN over the S2S VPN
Verifying Sophos Firewall Logs for Active Directory Authentication
- At this point, the Active Directory authentication for Sophos firewall and VPN services has been complete and works as intended by installing and using the Sophos client authentication agent on domain users' computers
- In this demonstration, I will be taking a look into the Sophos Firewall logs for these successful attempts at accessing the services defined in the IPsec outbound and inbound firewall rules
- The Sophos Firewall logs record detailed data about network traffic, including source and destination IP addresses, ports, protocols, and the status of the traffic (allowed, blocked, or dropped). This helps administrators understand which traffic is being allowed or denied, and why
- Sometimes misconfigurations in firewall rules or network setup can cause problems. Firewall logs and packet captures provide insight into whether traffic is being blocked or not traversing through a particular device because of incorrect rules or polices, helping to pinpoint configuration issues
SSL VPN Authentication
- Resources
- In this lab demonstration, I have a Corporate domain user outside of the lab network using a cellular hotspot that will be utilizing the Sophos Connect client to access internal resources over the SSL VPN using Active Directory authentication
- For the entirety of this lab demonstration of the section, I will be taking a closer look into configuring the Corporate site domain user, 'Charmander' and the Sophos Firewall for SSL VPN authentication using Active Directory
Sophos Connect Client
- The Sophos Connect client is a software application provided by Sophos to allow users to securely connect to a Sophos Firewall via SSL or IPsec VPN
- When implementing an external authentication server like Active Directory, it is often required for clients/users to download the client authentication agent, separate from the Sophos Connect client, to authenticate to the firewall for these types of services
- However, if Active Directory users are utilizing the Sophos Connect client for SSL VPN, users do not need the client authentication agent as the Sophos Connect client handles authentication directly, meaning users can connect to the VPN using their standard username and password without installing additional authentication software on their devices
SSL VPN Topology
SSL VPN Authentication Configuration Overview
- In this demonstration, I will also be documenting the Sophos Firewall Authentication configurations including the following:
- Defined Active Directory server using LDAPs for communication
- Primary Sophos authentication methods for the 'Firewall' & 'SSL VPN' services
- Imported AD groups and users
- SSL VPN policy
- SSL VPN global settings
Installing Sophos Connect Client
- In this demonstration, I will be installing the Sophos Connect client on the Corporate site PC for domain user 'Charmander', a helpdesk employee, to authenticate to the Corporate Sophos firewall to eventually access internal resources located at the Corporate site location via the SSL remote access VPN
- The Sophos Connect client and '.ovpn' configuration file can be installed by having the user access the Sophos VPN portal via either the 'LAN or WAN' zones or distributed by an administrator directly
Verifying Sophos SSL VPN Authentication Logs & Firewall Rules
- In this demonstration, I will be verifying the Sophos SSL VPN authentication logs to confirm the successful SSL VPN authentication using a domain user's Active Directory login credentials (Charmander) via the Sophos Connect client
- In this demonstration, I will be demonstrating the split-tunnel SSL VPN Firewall rule that will dictate what internal access to the Corporate LAN the authenticated Corporate site domain users have via the SSL remote access VPN
Testing SSL VPN Firewall Rule via Active Directory Authentication
- In this demonstration, I will be testing the SSL VPN firewall rule by accessing the services defined in the rule
- In this demonstration, I perform various tests from the Corporate site authenticated AD user 'Charmander'
- Pinging the internal Sophos firewall interface in the Corporate site including the DC1 Windows server providing Active Directory & RDP services
- Connecting to an accessible network share from the Windows DC1 server over the SSL VPN
- Establish an RDP connection to the Windows DC1 server located at the Corporate site LAN over the SSL VPN
Verifying Sophos Firewall Logs for Allowed Traffic via AD Authentication
- At this point, the Active Directory authentication for Sophos firewall and SSL VPN services has been complete and works as intended by installing and using the Sophos Connect client on domain users' computers
- In this demonstration, I will be taking a look into the Sophos Firewall logs for these successful attempts at accessing the services defined in the SSL VPN firewall rule