Thursday, December 5, 2019

Advice on architecture for a VPN link

Hi all,

I’m looking for some advice on setting up a VPN link. The situation is as follows, we have two offices in Europe, in the same city about 3-4miles apart. Office #1 has a VPN link towards the US, where one of our partners is situated. We use this VPN link for accessing their internal resources, remote workstations that our people use, etc...

In the Office #1 we have a Sonicwall NSA 2600, while Office #2 is running a Sophos XG 210 rev. 3.

While we were requesting another VPN link for Office #2, we were notified only one VPN link can exist.

Now I’m not too satisfied with the setup in either of those two offices (power delivery, no HA/failover, etc), not a lot of bandwidth is available and due to circumstances of the market here, increasing bandwidth can cost a lot.

So I had an idea about setting up a server in Germany (our HQ is there) that would be the termination point for the US VPN tunnel, and then the offices would connect separately to that server in Germany.

This server would be running like RouterOS x86 from Mikrotik? The only OS I could come up with, that had everything, maybe you guys have suggestions?

I’ve done a couple of measurements and the latency to the US VPN endpoint from offices #1 and #2 is about 150ms. Latency from Germany to the US endpoint is ~120ms and latency from our offices to Germany is 30-40ms.

One important thing to note, this VPN tunnel would be used heavily. Remote desktop connections will mostly go trough it.

The US VPN would be IPSec is I remember correctly, and their side is Cisco.

Would this be an acceptable solution? Or should we just invest in proper gear at one of the offices?

I’m really looking for some reality checks here, so I appreciate all feedback.

Thanks,



No comments:

Post a Comment