This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

New XG210 v18 firewall blocking traffic

Hi, we have a new XG210 v18 which has replaced an SG series UTM. I was able to get almost everything working properly except two things:

1. No matter how I set up a firewall rule, I can't get the internal LAN to be able to access resources in a remote RED site. The RED site can get to everything in the LAN no problem

2. A desktop scanner located at the RED site that was able to previously scan to a server folder located in the LAN using the server's NetBIOS name no longer works. Using its IP does work. So \\server\share does not work, but \\192.168.1.10\share does work.

Part of the issue is I don't fully understand the concept of zones, and would rather not use them in this simple environment if I don't have to. I've seen the videos on the topic, but I don't understand for example, why you would have a source zone and also a source network, and same with destination. Why do I need the source zone if the source network is right there to choose?

Thanks,

Mark

 

PS I just saw the link to the v18 training so I'm going to watch that as soon as possible but since this unit is in production now, I'd like to resolve these issues soon since I suspect it's something simple I'm missing



This thread was automatically locked due to age.
Parents
  • FormerMember
    0 FormerMember

    Hi  

    Thank you for reaching out to the Community! 

    The xg firewall is zone-based; please check out the following KBA for more info: Sophos Firewall: What is a Zone.

    For your first issue, you have to configure LAN to LAN rule or LAN to RED rule; the destination zone depends on your RED interface zone. 

    For your second issue, did you configure domain name in RED DHCP server configuration? If not, please add the domain name in the red interface DHCP server. 

    Thanks,

  • To minimize my own confusion, and since I have a small number of networks and resources, is there anything wrong with having a one-to-one relationship with the zone and the network? For example, LAN zone would only include the internal LAN. Wifi zone would only include the wifi subnet. RED zone would only include the RED's subnet, etc. 

Reply
  • To minimize my own confusion, and since I have a small number of networks and resources, is there anything wrong with having a one-to-one relationship with the zone and the network? For example, LAN zone would only include the internal LAN. Wifi zone would only include the wifi subnet. RED zone would only include the RED's subnet, etc. 

Children
No Data