This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

WAN interface with VLAN TAG

I need to that my WAN Interface on a XG 115 is consigured with a VLAN TAG ID. 

 

On the  SG I manage to do it, but now in the XG i'm not finding how it can be done. 

Thank you. 



This thread was automatically locked due to age.
Parents Reply Children
  • You can use PPPoE as a mode with DHCP and "Preference IP" plus VLAN ID.

  • This won't work as we only have Static IP details from the ISP (no PPoE login)

  • Hi Mark ,

    The configuration shown below should work.

  • Hello

    Assume you have configured on port2 as following.

     

    Port2 as LAN Zone with IP 192.168.10.1/24

    Port2 with VLAN 20 as LAN Zone with IP 192.168.20.1/24

    Port2 with VLAN 30 as WAN Zone with IP as 10.10.10.10/24 and Gateway as 10.10.10.1

     

    Scenario 1.

     

    Allow traffic between 192.168.10.X to 192.168.20.x 

     

    Src Zone: LAN / Src Net: 192.168.10.x/24

    Dst Zone: LAN / Dst Net: 192.168.20.x/24

    Service: Any

     

    Scenario 2.

     

    Allow traffic from LAN 192.168.10.x and 192.168.20.x  to WAN.

     

    Src Zone: LAN / Src Net: Any

    Dst Zone: WAN / Dst Net: Any

    Service: Any

    Rewrite Source Address: Enable

    Primary Gateway: WAN-Link Load Balance

     

    Similar you can also create business rule to forward WAN to LAN traffic.

     

    Regards, Ronak.

  • Doesn't really answer my question !

  • Hi Mark,

    Didn't understand all of your questions, but hope below could help a little bit with your case.

    (1) Configure the vlan interface on top of WAN physical interface.
          The config result is like below,
         

         What Sophos suggested is,

          create a dummy zone (named as "WAN_Physical" and type is "DMZ", no firewall rules associated with this interface),

          assign this zone to physical wan interface and set an private static ip for physical interface, 

          add vlan interface as the kb mentioned, (portC.10 in my case, detail kb is https://community.sophos.com/kb/en-us/123127) ,put the vlan interface to WAN zone.

    (2) create firewall rules to allow/deny traffic as you want. 
          Only default LAN-to-WAN rule applied in my sample.

          

    (3) For the traffic initiated by LAN users, it will go through this default rule.

         if you want to set up some WAN-to-LAN traffic, for example, to allow internet user to access a FTP server in your LAN, you have to create another separate rule to achieve this. I used a DNAT rule example here. KB url is https://community.sophos.com/kb/en-us/122976.


        

     

    Hoping this can answer your questions :)

  • Hi Peng

    I have already solved this but thanks for the input anyway.

    For 1.) I just assigned the physical WAN interface as DHCP, then added the VLAN as you suggested. Did not need any dummy zone just normal LAN -> WAN firewall rule and VPN rules.

    All I needed to do then is to bind my VPN's to the VLAN port (not physical port) and every thing worked.

     

    Thanks

     

    Mark