This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

WAN interface with VLAN TAG

I need to that my WAN Interface on a XG 115 is consigured with a VLAN TAG ID. 

 

On the  SG I manage to do it, but now in the XG i'm not finding how it can be done. 

Thank you. 



This thread was automatically locked due to age.
Parents Reply Children
  • Hi Mark,

    Didn't understand all of your questions, but hope below could help a little bit with your case.

    (1) Configure the vlan interface on top of WAN physical interface.
          The config result is like below,
         

         What Sophos suggested is,

          create a dummy zone (named as "WAN_Physical" and type is "DMZ", no firewall rules associated with this interface),

          assign this zone to physical wan interface and set an private static ip for physical interface, 

          add vlan interface as the kb mentioned, (portC.10 in my case, detail kb is https://community.sophos.com/kb/en-us/123127) ,put the vlan interface to WAN zone.

    (2) create firewall rules to allow/deny traffic as you want. 
          Only default LAN-to-WAN rule applied in my sample.

          

    (3) For the traffic initiated by LAN users, it will go through this default rule.

         if you want to set up some WAN-to-LAN traffic, for example, to allow internet user to access a FTP server in your LAN, you have to create another separate rule to achieve this. I used a DNAT rule example here. KB url is https://community.sophos.com/kb/en-us/122976.


        

     

    Hoping this can answer your questions :)

  • Hi Peng

    I have already solved this but thanks for the input anyway.

    For 1.) I just assigned the physical WAN interface as DHCP, then added the VLAN as you suggested. Did not need any dummy zone just normal LAN -> WAN firewall rule and VPN rules.

    All I needed to do then is to bind my VPN's to the VLAN port (not physical port) and every thing worked.

     

    Thanks

     

    Mark