This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG Firewall in MTA mode respond to all IP in WAN interface

Hello!

I have two questions:

1. When configuring the firewall in MTA mode, each WAN IP address responds to TCP port 25. Can I Limit this to only 1 IP to which it responds?
2. Where is that specific IP address of the WAN the firewall should use for outgoing emails?

Suppose I need to check all outgoing emails (using MTA mode, my email server use XG firewall as SMTP relayhost); Suppose I have two connectivity:
 How do I specify the NAT rules to use?

Using community.sophos.com/.../125596 is not clear to answer previous questions.
Any help?

Thank you



This thread was automatically locked due to age.
  • Hi GabrieleD,

    If you use MTA mode, Sophos XG will auto-create firewall (top of list firewall rules). You are able to check this firewall rule.

    Hope help you!

  • Yes , I see this rule

    My firewall in WAN interface have multiple alias. One of my IP alias is public IP of my mailserver (MX).

    I edit auto-create firewall rule and specify IP address of my mailserver (MX) to destination IP; I can connet to TCP port 25 not only to that alias but also primary IP, and other aliases....

    What IP address my firewall use when send email (scan outgoing mail) ?

  • Hi GabrieleD,

    You need create Source NAT profile, prefer artcle: https://community.sophos.com/kb/en-us/123294

    Then, in auto-create rule, please choose SNAT profile which you create above in Use Outbound Address instead of MASQ.

    Hope help you!

  • Hello Huy Vu,

    I've had a lot of work, sorry!

    There are two questions, perhaps I have not been clear:

    1. My firewall WAN interface have multiple IP / Alias. One alias is IP of mailserver (corresponds to MX)

    The firewall must respond only to the specific IP address not all IPs assigned to the WAN interface

    With default "Auto added firewall policy for MTA" responds to SMTP commands on all WAN IP addresses.

    2. When internal maillserver (RelayHost) send outgoing email wich IP address use? (Your response SNAT Profile...)

    Thanks

  • UTM had this same issue as well when the MTA is configured. The automatic rule being configured is an inbound rule. Once you have it configured add another firewall rule to block destination port 25. You are also going to need a source NAT (SNAT) rule on your firewall so when your mail server sends e-mail (Assuming that your are using your XG as your relay host) it uses the correct IP (your MX) outbound.

    In my opinion this could be an easy fix for Sophos to set the MTA listener with an IP:25 instead of just :25.

     

    Hope this helps.

    -Ron

  • Hi GabrieleD ,

    In MTA mode  , we have no definative way to block incomming SMTP port from specific address.  You may try to create a rule Source WAN  Destination LAN , Destination PORT 25 ADDRESS <ALL ALIAS >

    If this does not work then you may raise a feature request to add additional configuration.

  • Hello Ron and Aditya

    I agree with Ron opinion: define in MTA General settings where MTA is listen.....

     

    Another problem is SMTP auth to send email where users are "external", and I need to treat SMTP traffic in a different way:

    a. SMTP to receive email from other mailserver

    a. SMTP to receive email from legitimate clients outside organizazion (via SMTP Auth)

    Currently Sophos MTA does not support authentication, for this reason I need to use to DNS name.

    A working solution:

    smtp.domain.com -> to send mail

    mail.domain.com -> to receive email  (correspond to MX record)

    internal server = 192.168.1.5

    Internal users connect via SMTP auth to smtp.domain.com (thats is resoved to 192.168.1.5) to send email

    External user connect via SMTP auth to smtp.domain.com to send email... I need create a Business App DNAT rule that precedes the "Auto added firewall policy for MTA"

    That's it's important to specify on which IP MTA listen...

    Thanks

  • Hi GabrieleD

    If you create Business App DNAT, all of traffic to your Mail Server will through DNAT policy. Because NAT policy have high priority.

     

  • @ 

    Keep in mind most modern mail servers should be configured to use port 587 to send e-mail with authentication and port 25 is primarily used for mail server to mail server communications. Have you thought about setting up a DNAT rule for port 587 directly to your mail server and then have the XG running in MTA mode process your mail for SPAM and viruses before being forwarded to your mail server before finally delivery?

    The above is how I did it when I was running UTM with a paid for SSL certificate but I have since switched over to LetsEncrypt on my mail system and XG still has no support for it.  :( So for now I am just using DNAT for inbound and SNAT for outbound.

    With the release of 17.1 GA your users can now manage their white/black list from the user portal. Glad to see this feature be added to XG to close one more thing from the feature parity list of UTM.

    Now if XG would add LetsEncrypt my XG Home firewall would be in heaven.  :)

     

    Hope the information helps.

    -Ron

  • Hi Ron.

    Thanks for your info!