

These users are allowed to access resources on the local subnet. You create a policy that allows users in the Remote SSL VPN group to connect. If required, you can also update the subnet mask. When SSL VPN clients connect to Sophos Firewall, it assigns IP addresses from the address range you specify here. Specify an IP address range for SSL VPN clients Scroll to SSL VPN authentication methods.Ĭheck that the authentication server is set to Local. Under Firewall authentication methods, check that the authentication server is set to Local.Īlternatively, you can select an authentication server, such as the Active Directory server you've configured under Authentication > Servers. Sophos Firewall then acts as the authentication server. In this example, you set the firewall and SSL VPN authentication methods to local authentication.


The group specifies a surfing quota and access time. You create a user group for the remote SSL VPN and add a user. Go to Hosts and services > IP host and click Add.Įnter a name and network for the local subnet.The local subnet defines the network resources that remote clients can access. Import the configuration file into the client and establish the connection.Install the Sophos Connect client on their endpoint devices.See Sophos Connect client: Compatibility with platforms. For these endpoints, you can use the OpenVPN Connect client. It also doesn't support mobile platforms for IPsec and SSL VPN. Create an L2TP remote access connectionĬurrently, the Sophos Connect client doesn't support macOS for SSL VPN.Create a remote access SSL VPN with the legacy client.Install and configure Sophos Connect client on endpoints.

Specify an IP address range for SSL VPN clients.Configure remote access SSL VPN with Sophos Connect client Configure remote access SSL VPN with Sophos Connect client Table of contents.Configure IPsec remote access VPN with Sophos Connect client.
