This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SFOS v18.0.379 - Hairpin Nat / Loopback rule can't get to work

Good day guys

i have a Sophos Firewall XG 310, i upgraded form version 17.5 MR9 to  version 18.0.379 due to security vulnerability..
in my time with version v17.5 i have no problem regarding all my config.. i have 2 DNAT rules 1 rule is for incoming WAN interface which doesn't have any masq, the other on above it is from incoming LAN interface which i put a masq..

there rules are for accessing public ip of the the hosted internal server..

bbackground: we do have blocks of public ip that that is natted on different local ip of servers

problem: in version 18.0.379 i've made 2 firewall rules, 1 is for LAN to public ip of out internal server..

SOURCE ZONE: any ,

SOURCE NETWORKS: the local subnet

DESTINATION ZONE: my local zone made

DESTINATION NETWORKS: the public ip of the server

then i made a DNAT which is working in when outside the network connecting to our server public ip,here is another DNAT for the internal trying to connect to out server public ip in the same network

Original source: the local network subnet
Translated source (SNAT) : MASQ

Original destination: the public ip of the server
 Translated destination (DNAT): Local ip of the server
 
 
 
 
 
 
 


This thread was automatically locked due to age.
Parents
  • FormerMember
    0 FormerMember

    Hi  

    I would advise you to select Create loopback rule when you create a DNAT rule. This option is only available when you add a new DNAT rule, please try to create a new DNAT rule and select Create loopback rule and let us know how it turns out for you.

    Thanks,

     

  • i've already tried it, i also studied what the settings of the loopback and tried to recreate it, tried putting to different sequences (hnat top, dnat mid, snat lowest)

    i've also tried making firewall rules from LAN to ANY.

  • Hi,

     

    we´ve the same problem with multiple Sophos XG boxes. All running either 18.0.379 or 18.0.339

     

    It´s just not working. I took one test-box and started with an empty ruleset for the sole reason to get DNAT with loopback running.

    Tried multiples ways:

    - "Server access assisstant (DNAT)" from NAT tab.

    - created rules manually

    - created firewall rule and linked nat rules

    No success. Externally everything is fine. Internally no connection. Connecting to the internal ip directly works, but is not what my customer is asking for. We need to connect to the external ip. Split DNS is the last resort to fix that. But hairpin NAT should be working.

     

    When I create a firewall rule at the bottom to allow everything it works. Logged that traffic and tried to create a rule with the contents from what I found in the logs. But this doesn´t fix it. It only works with an "allow all" rule, which isn´t useful in production.

    Contents of logs:

    I can see traffic from lan-interface (port1) to lan-interface (port1) with source ip within the range of the lan-interface and destination ip of port2 (wan). I created a rule to allow everything from port1 and to port1. Nothing.

     

    I think there is a bug in v18.

     

    Please fix it!

Reply
  • Hi,

     

    we´ve the same problem with multiple Sophos XG boxes. All running either 18.0.379 or 18.0.339

     

    It´s just not working. I took one test-box and started with an empty ruleset for the sole reason to get DNAT with loopback running.

    Tried multiples ways:

    - "Server access assisstant (DNAT)" from NAT tab.

    - created rules manually

    - created firewall rule and linked nat rules

    No success. Externally everything is fine. Internally no connection. Connecting to the internal ip directly works, but is not what my customer is asking for. We need to connect to the external ip. Split DNS is the last resort to fix that. But hairpin NAT should be working.

     

    When I create a firewall rule at the bottom to allow everything it works. Logged that traffic and tried to create a rule with the contents from what I found in the logs. But this doesn´t fix it. It only works with an "allow all" rule, which isn´t useful in production.

    Contents of logs:

    I can see traffic from lan-interface (port1) to lan-interface (port1) with source ip within the range of the lan-interface and destination ip of port2 (wan). I created a rule to allow everything from port1 and to port1. Nothing.

     

    I think there is a bug in v18.

     

    Please fix it!

Children