This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG 135 | Zurücksetzen auf Werkseinstellungen OHNE Netzwerkzugriff (V18)

Hallo zusammen,

ich habe mich unglücklicherweise über eine zu schnell gesetzte Netzwerkregel (NAT-Regel) vollständig von meiner XG 135 Firewall ausgeschlossen. Wie kann ich diese nun auf Werkseinstellungen zurücksetzen, auch wenn ich keinen Zugang mehr zu der Weboberfläche habe? Ich habe die Firewall auch bereits an Monitor und Tastatur angeschlossen und im „BIOS“ nach einer Möglichkeit zum zurücksetzen gesucht, allerdings ohne Erfolg...

Wie kann ich das Problem beheben?



This thread was automatically locked due to age.
Parents
  • I'm not sure if it works on XG, but on UTMs you could set a temporary iptables rule to allow all traffic "any any permit" for the INPUT Chain.

    This should literally allow all inbound traffic, regardless of configured rules.

     

    iptables -I INPUT -j ACCEPT

     

     

    On the UTM such  iptables rules got overwritten by the config process after a few seconds. to avoid this you can "watch" the commands, which basically executes it over and over again.

     

    watch iptables -I INPUT -j ACCEPT

     

    to delete the rule manually

    iptables -D INPUT -j ACCEPT

     

     

    If this works, you could login to delete the bad NAT rule.

     

    I described this in my (german) blog a couple years ago.

    https://www.show-run.ch/sophos/sophos_firewall_rules_per_iptables_auf_der_console_deaktivieren/

     

    Disclaimer for others: only do this in recovery scenarios where the box is not connected to the internet, because iptables changes from the CLI are not recognized in the GUI and you could easly create an unnoticed backdoor.

    cheers

Reply
  • I'm not sure if it works on XG, but on UTMs you could set a temporary iptables rule to allow all traffic "any any permit" for the INPUT Chain.

    This should literally allow all inbound traffic, regardless of configured rules.

     

    iptables -I INPUT -j ACCEPT

     

     

    On the UTM such  iptables rules got overwritten by the config process after a few seconds. to avoid this you can "watch" the commands, which basically executes it over and over again.

     

    watch iptables -I INPUT -j ACCEPT

     

    to delete the rule manually

    iptables -D INPUT -j ACCEPT

     

     

    If this works, you could login to delete the bad NAT rule.

     

    I described this in my (german) blog a couple years ago.

    https://www.show-run.ch/sophos/sophos_firewall_rules_per_iptables_auf_der_console_deaktivieren/

     

    Disclaimer for others: only do this in recovery scenarios where the box is not connected to the internet, because iptables changes from the CLI are not recognized in the GUI and you could easly create an unnoticed backdoor.

    cheers

Children
No Data