<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cấu Hình VPN Site To Site &#8211; VACIF-EN</title>
	<atom:link href="https://vacif.com/en/tag/cau-hinh-vpn-site-to-site/feed/" rel="self" type="application/rss+xml" />
	<link>https://vacif.com/en</link>
	<description>Investing in Value</description>
	<lastBuildDate>Mon, 09 Mar 2026 07:38:43 +0000</lastBuildDate>
	<language>vi</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://vacif.com/en/wp-content/uploads/sites/3/2024/06/cropped-icon-32x32.png</url>
	<title>Cấu Hình VPN Site To Site &#8211; VACIF-EN</title>
	<link>https://vacif.com/en</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>[Latest 2026] Sophos Firewall: Guide to Configuring VPN Site-to-Site Between Two Sophos Firewall Devices Firmware V22</title>
		<link>https://vacif.com/en/moi-nhat-2026-sophos-firewall-huong-dan-cau-hinh-vpn-site-to-site-giua-2-thiet-bi-sophos-firewall-firmware-v22/</link>
					<comments>https://vacif.com/en/moi-nhat-2026-sophos-firewall-huong-dan-cau-hinh-vpn-site-to-site-giua-2-thiet-bi-sophos-firewall-firmware-v22/#respond</comments>
		
		<dc:creator><![CDATA[trang nguyen]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 08:07:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[export]]></category>
		<category><![CDATA[Hướng dẫn]]></category>
		<category><![CDATA[Hướng dẫn/Tài liệu]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Tài liệu và Hướng dẫn]]></category>
		<category><![CDATA[Cấu Hình VPN Site To Site]]></category>
		<category><![CDATA[Sophos Firewall]]></category>
		<category><![CDATA[Sophos Firewall Firmware V22]]></category>
		<guid isPermaLink="false">https://vacif.com/?p=29071</guid>

					<description><![CDATA[This article guides the configuration of IPsec Site-to-Site VPN between two Sophos Firewall XGS devices using firmware v22, in order to establish a secure connection between two network systems located at two different sites. Objectives of the lab: Deployment environment: The enterprise has two sites using two Sophos Firewall XGS devices connecting to the Internet [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="root-eb-toc-71c36 wp-block-essential-blocks-table-of-contents"><div class="eb-parent-wrapper eb-parent-eb-toc-71c36 "><div class="eb-toc-container eb-toc-71c36  eb-toc-is-not-sticky eb-toc-not-collapsible eb-toc-initially-not-collapsed eb-toc-scrollToTop style-1 list-style-none" data-scroll-top="false" data-scroll-top-icon="fas fa-angle-up" data-collapsible="false" data-sticky-hide-mobile="false" data-sticky="false" data-scroll-target="scroll_to_toc" data-copy-link="false" data-editor-type="" data-hide-desktop="false" data-hide-tab="false" data-hide-mobile="false" data-itemCollapsed="false" data-highlight-scroll="false"><div class="eb-toc-header"><h2 class="eb-toc-title">Table of Contents</h2></div><div class="eb-toc-wrapper " data-headers="[{&quot;level&quot;:2,&quot;content&quot;:&quot;I \u2013 Overview of the article&quot;,&quot;text&quot;:&quot;I \u2013 Overview of the article&quot;,&quot;link&quot;:&quot;i-overview-of-the-article&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;II \u2013 Network diagram&quot;,&quot;text&quot;:&quot;II \u2013 Network diagram&quot;,&quot;link&quot;:&quot;ii-network-diagram&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;III \u2013 Configuration scenario&quot;,&quot;text&quot;:&quot;III \u2013 Configuration scenario&quot;,&quot;link&quot;:&quot;iii-configuration-scenario&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;IV \u2013 Configuration steps&quot;,&quot;text&quot;:&quot;IV \u2013 Configuration steps&quot;,&quot;link&quot;:&quot;iv-configuration-steps&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;V \u2013 Detailed guide to configuring VPN site-to-site between two Sophos Firewall devices Firmware V22&quot;,&quot;text&quot;:&quot;V \u2013 Detailed guide to configuring VPN site-to-site between two Sophos Firewall devices Firmware V22&quot;,&quot;link&quot;:&quot;v-detailed-guide-to-configuring-vpn-site-to-site-between-two-sophos-firewall-devices-firmware-v22&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;1. Configuration on Sophos Firewall 1&quot;,&quot;text&quot;:&quot;1. Configuration on Sophos Firewall 1&quot;,&quot;link&quot;:&quot;1-configuration-on-sophos-firewall-1&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;2. Configuration on Sophos Firewall 2&quot;,&quot;text&quot;:&quot;2. Configuration on Sophos Firewall 2&quot;,&quot;link&quot;:&quot;2-configuration-on-sophos-firewall-2&quot;}]" data-visible="[true,true,true,true,true,true]" data-delete-headers="[{&quot;label&quot;:&quot;I \u2013 Overview of the article&quot;,&quot;value&quot;:&quot;i-overview-of-the-article&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;II \u2013 Network diagram&quot;,&quot;value&quot;:&quot;ii-network-diagram&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;III \u2013 Configuration scenario&quot;,&quot;value&quot;:&quot;iii-configuration-scenario&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;IV \u2013 Configuration steps&quot;,&quot;value&quot;:&quot;iv-configuration-steps&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;V \u2013 Detailed guide to configuring VPN site-to-site between two Sophos Firewall devices Firmware V22&quot;,&quot;value&quot;:&quot;v-detailed-guide-to-configuring-vpn-site-to-site-between-two-sophos-firewall-devices-firmware-v22&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;1. Configuration on Sophos Firewall 1&quot;,&quot;value&quot;:&quot;1-configuration-on-sophos-firewall-1&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;2. Configuration on Sophos Firewall 2&quot;,&quot;value&quot;:&quot;2-configuration-on-sophos-firewall-2&quot;,&quot;isDelete&quot;:false}]" data-smooth="true" data-top-offset=""><div class="eb-toc__list-wrap"><ul class='eb-toc__list'><li><a href="#i-overview-of-the-article">I – Overview of the article</a><li><a href="#ii-network-diagram">II – Network diagram</a><li><a href="#iii-configuration-scenario">III – Configuration scenario</a><li><a href="#iv-configuration-steps">IV – Configuration steps</a><li><a href="#v-detailed-guide-to-configuring-vpn-site-to-site-between-two-sophos-firewall-devices-firmware-v22">V – Detailed guide to configuring VPN site-to-site between two Sophos Firewall devices Firmware V22</a><li><a href="#1-configuration-on-sophos-firewall-1">1. Configuration on Sophos Firewall 1</a><li><a href="#2-configuration-on-sophos-firewall-2">2. Configuration on Sophos Firewall 2</a></ul></div></div></div></div></div>


<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-oiy73"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-oiy73 "><div class="eb-advance-heading-wrapper eb-advance-heading-oiy73 button-1 undefined" data-id="eb-advance-heading-oiy73"><h2 class="eb-ah-title"><span class="first-title">I – Overview of the article</span></h2></div></div></div>



<p>This article guides the configuration of <strong>IPsec Site-to-Site VPN between two Sophos Firewall XGS devices using firmware v22</strong>, in order to establish a secure connection between two network systems located at two different sites.</p>



<p><strong>Objectives of the lab:</strong></p>



<ul class="wp-block-list">
<li>Successfully establish an <strong>IPsec tunnel between the two firewalls</strong>.</li>



<li>Allow the <strong>two LAN networks at the two sites to access and exchange data with each other</strong>.</li>



<li>Ensure that <strong>all traffic transmitted through the Internet is securely encrypted</strong>.</li>



<li><strong>Check and verify the operating status of the VPN Tunnel</strong>.</li>



<li>Clearly understand the <strong>operation mechanism of Phase 1 (IKE SA) and Phase 2 (IPsec SA)</strong> in the VPN establishment process.</li>
</ul>



<p><strong>Deployment environment:</strong></p>



<ul class="wp-block-list">
<li><strong>02 Sophos Firewall XGS (Virtual Appliance).</strong></li>



<li>Installed on the <strong>Proxmox VE virtualization platform</strong>.</li>



<li>Both ends use <strong>static WAN IP addresses</strong>, provided by a real firewall/router to simulate a real environment.</li>
</ul>



<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-5y1xh"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-5y1xh "><div class="eb-advance-heading-wrapper eb-advance-heading-5y1xh button-1 undefined" data-id="eb-advance-heading-5y1xh"><h2 class="eb-ah-title"><span class="first-title">II – Network diagram</span></h2></div></div></div>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="975" height="903" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-13.png" alt="" class="wp-image-29072" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-13.png 975w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-13-300x278.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-13-768x711.png 768w" sizes="(max-width: 975px) 100vw, 975px" /></figure>



<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-8qbrk"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-8qbrk "><div class="eb-advance-heading-wrapper eb-advance-heading-8qbrk button-1 undefined" data-id="eb-advance-heading-8qbrk"><h2 class="eb-ah-title"><span class="first-title">III – Configuration scenario</span></h2></div></div></div>



<p>The enterprise has <strong>two sites using two Sophos Firewall XGS devices</strong> connecting to the Internet through a <strong>Viettel router</strong> with WAN IP addresses <strong>123.123.123.11 and 123.123.123.15</strong> respectively.</p>



<p>Each site has its own LAN network which is <strong>100.100.100.0/24 and 200.200.200.0/24</strong>.</p>



<p>Currently these two networks <strong>cannot access each other through the Internet</strong>.</p>



<p>The requirement is to <strong>allow the two LAN networks to communicate securely and stably</strong>.</p>



<p>The solution is to <strong>deploy an IPsec Site-to-Site VPN to encrypt and connect the two systems through the Internet</strong>.</p>



<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-p2o1y"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-p2o1y "><div class="eb-advance-heading-wrapper eb-advance-heading-p2o1y button-1 undefined" data-id="eb-advance-heading-p2o1y"><h2 class="eb-ah-title"><span class="first-title">IV – Configuration steps</span></h2></div></div></div>



<ul class="wp-block-list">
<li>Prepare configuration information</li>



<li>Create <strong>Network Object (Host/Subnet)</strong></li>



<li>Configure <strong>IPsec Site-to-Site VPN</strong></li>



<li>Create <strong>Firewall Rule to allow LAN <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> VPN traffic</strong></li>
</ul>



<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-8kdbt"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-8kdbt "><div class="eb-advance-heading-wrapper eb-advance-heading-8kdbt button-1 undefined" data-id="eb-advance-heading-8kdbt"><h2 class="eb-ah-title"><span class="first-title">V – Detailed guide to configuring VPN site-to-site between two Sophos Firewall devices Firmware V22</span></h2></div></div></div>



<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-hbhxd"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-hbhxd "><div class="eb-advance-heading-wrapper eb-advance-heading-hbhxd button-1 undefined" data-id="eb-advance-heading-hbhxd"><h2 class="eb-ah-title"><span class="first-title">1. Configuration on Sophos Firewall 1</span></h2></div></div></div>



<div class="wp-block-essential-blocks-text  root-eb-text-unl1v"><div class="eb-parent-wrapper eb-parent-eb-text-unl1v "><div class="eb-text-wrapper eb-text-unl1v" data-id="eb-text-unl1v"><p class="eb-text">Step 1: Check the interface configuration. On <strong>Sophos Firewall 1</strong>, the <strong>WAN port IP is 123.123.123.11</strong>, and <strong>LAN is 100.100.100.1/24</strong>.</p></div></div></div>



<figure class="wp-block-image size-full"><img decoding="async" width="936" height="780" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-15.png" alt="" class="wp-image-29074" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-15.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-15-300x250.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-15-768x640.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></figure>



<p>Step 2: Add Local and Remote LAN Network</p>



<p>Go to <strong>Hosts and services → IP Host → Add</strong> to add the <strong>local and remote LAN network</strong> as shown in the image below.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="936" height="727" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-14.png" alt="" class="wp-image-29073" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-14.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-14-300x233.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-14-768x597.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></figure>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-19.png" alt="" class="wp-image-29079"/></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-4keta"><div class="eb-parent-wrapper eb-parent-eb-text-4keta "><div class="eb-text-wrapper eb-text-4keta" data-id="eb-text-4keta"><p class="eb-text">Step 3: Go to <strong>Administrator → Device Access → WAN: check IPsec</strong></p></div></div></div>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="732" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-20.png" alt="" class="wp-image-29078" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-20.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-20-300x235.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-20-768x601.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-uouu5"><div class="eb-parent-wrapper eb-parent-eb-text-uouu5 "><div class="eb-text-wrapper eb-text-uouu5" data-id="eb-text-uouu5"><p class="eb-text">Step 4: Create IPsec Connection</p></div></div></div>



<p>Go to <strong>Site to site → IPsec → Add</strong></p>



<ul class="wp-block-list">
<li><strong>IP Version:</strong> IPv4 → The tunnel uses IPv4 addresses to establish IKE and transmit ESP data.</li>



<li><strong>Connection Type:</strong> Policy-based → Only the subnets declared in <strong>Local subnet</strong> and <strong>Remote subnet</strong> are allowed to pass through the tunnel.</li>



<li><strong>Gateway Type:</strong> Respond only → This firewall does not initiate the connection, it only responds when the other side initiates it.</li>



<li><strong>Profile:</strong> IKEv2 → A newer VPN standard, more stable and secure than IKEv1.</li>



<li><strong>Authentication:</strong> Preshared Key (PSK) → Both firewalls use the same shared secret password.</li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-16.png" alt="" class="wp-image-29076"/></figure>



<ul class="wp-block-list">
<li><strong>Listening interface:</strong> 123.123.123.11 → This is the WAN IP of this firewall, the firewall will wait for VPN connections at this IP.</li>



<li><strong>Gateway address:</strong> 123.123.123.15 → This is the WAN IP of the other firewall, the VPN will connect to this IP.</li>



<li><strong>Local Subnet:</strong> LOCAL_VLAN_100 → The internal network on this side that is allowed to pass through the VPN.</li>



<li><strong>Remote Subnet:</strong> VPN_VLAN_200 → The internal network on the other side.</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="729" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-18.png" alt="" class="wp-image-29077" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-18.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-18-300x234.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-18-768x598.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-17.png" alt="" class="wp-image-29075"/></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-iljad"><div class="eb-parent-wrapper eb-parent-eb-text-iljad "><div class="eb-text-wrapper eb-text-iljad" data-id="eb-text-iljad"><p class="eb-text">Step 5: Create Firewall Rule</p></div></div></div>



<ul class="wp-block-list">
<li><strong>Rule name:</strong> VPN_SF_TO_SF1</li>



<li><strong>Action:</strong> Accept → Allow traffic to pass</li>



<li><strong>Log firewall traffic:</strong> Check → Log traffic for verification when necessary</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="741" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-21.png" alt="" class="wp-image-29080" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-21.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-21-300x238.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-21-768x608.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<ul class="wp-block-list">
<li><strong>Source zones:</strong> LAN, VPN → Meaning traffic can originate from the internal network or from the VPN side.</li>



<li><strong>Source networks:</strong> LOCAL_VLAN_100, VPN_VLAN_200 → Only these networks are allowed to use this rule.</li>



<li><strong>Destination zones:</strong> LAN, VPN → Allow two-way access between LAN and VPN.</li>



<li><strong>Destination networks:</strong> LOCAL_VLAN_100, VPN_VLAN_200</li>



<li><strong>Services:</strong> Any → Allow all services (ping, RDP, SMB, HTTP…)</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="975" height="692" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-31.png" alt="" class="wp-image-29093" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-31.png 975w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-31-300x213.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-31-768x545.png 768w" sizes="auto, (max-width: 975px) 100vw, 975px" /></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-8iylg"><div class="eb-parent-wrapper eb-parent-eb-text-8iylg "><div class="eb-text-wrapper eb-text-8iylg" data-id="eb-text-8iylg"><p class="eb-text">Step 6: Check VPN status</p></div></div></div>



<p>Go to <strong>Site to site VPN → IPsec → Check Active and Connection to enable the configuration</strong>.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="736" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-22.png" alt="" class="wp-image-29081" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-22.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-22-300x236.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-22-768x604.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<div class="wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-8jx05"><div class="eb-parent-wrapper eb-parent-eb-advance-heading-8jx05 "><div class="eb-advance-heading-wrapper eb-advance-heading-8jx05 button-1 undefined" data-id="eb-advance-heading-8jx05"><h2 class="eb-ah-title"><span class="first-title">2. Configuration on Sophos Firewall 2</span></h2></div></div></div>



<p>Go to <strong>Hosts and services → IP Host → Add</strong> to add the <strong>local and remote LAN network</strong> as shown below.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-24.png" alt="" class="wp-image-29083"/></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="726" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-23.png" alt="" class="wp-image-29082" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-23.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-23-300x233.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-23-768x596.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-hch3o"><div class="eb-parent-wrapper eb-parent-eb-text-hch3o "><div class="eb-text-wrapper eb-text-hch3o" data-id="eb-text-hch3o"><p class="eb-text">Step 1: Create an IPsec VPN connection to Firewall 1</p></div></div></div>



<p>Go to <strong>Site-to-Site VPN → IPsec</strong> and select <strong>Add</strong>.</p>



<p>Create the connection with the parameters below.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-25.png" alt="" class="wp-image-29086"/></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="734" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-27.png" alt="" class="wp-image-29084" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-27.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-27-300x235.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-27-768x602.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-patfl"><div class="eb-parent-wrapper eb-parent-eb-text-patfl "><div class="eb-text-wrapper eb-text-patfl" data-id="eb-text-patfl"><p class="eb-text">Step 2: Create Firewall Rules for Firewall 2</p></div></div></div>



<p>Go to <strong>Rules and Policies → Firewall rules → Add</strong> as shown below.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-29.png" alt="" class="wp-image-29088"/></figure>



<div class="wp-block-essential-blocks-text  root-eb-text-tglf7"><div class="eb-parent-wrapper eb-parent-eb-text-tglf7 "><div class="eb-text-wrapper eb-text-tglf7" data-id="eb-text-tglf7"><p class="eb-text">Step 3: Check VPN status</p></div></div></div>



<ul class="wp-block-list">
<li>Go to <strong>Site to site → IPsec → Check Active and Connection to start the connection</strong>.</li>



<li>From a computer in <strong>LAN 100.100.100.0/24</strong>, ping a computer in <strong>LAN 200.200.200.0/24 → ping successful</strong>.</li>



<li>Conversely, from a computer in <strong>LAN 200.200.200.0/24</strong>, ping a computer in <strong>LAN 100.100.100.0/24 → ping successful</strong>.</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="936" height="733" src="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-28.png" alt="" class="wp-image-29087" srcset="https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-28.png 936w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-28-300x235.png 300w, https://vacif.com/en/wp-content/uploads/sites/3/2026/03/image-28-768x601.png 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-30.png" alt="" class="wp-image-29089"/></figure>



<figure class="wp-block-image size-full"><img decoding="async" src="https://vacif.com/en/wp-content/uploads/2026/03/image-26.png" alt="" class="wp-image-29085"/></figure>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://vacif.com/en/moi-nhat-2026-sophos-firewall-huong-dan-cau-hinh-vpn-site-to-site-giua-2-thiet-bi-sophos-firewall-firmware-v22/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
