Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Trying to decipher Port Forwarding for XG (Home) software - web cams.

My goal is to have some webcams at home, each using their own dedicated Port number (same port #) through the Internet - Firewall - Switch - camera.  (Obviously the switch doesn't care.  But my web cams do care. 

I have posted a copy of my Firewall and NAT rules below. 

I have done this many times using cheap consumer firewalls and most recently on my Meraki MX device.  I moved from MX to the Sophos XG free solution on extra hardware I have around to take advantage of the higher download speeds that my ISP provides.  (My MX limitation is 250M). 

What disturbs me in the way that I have this working is that other than the fact that the server (camera) accepts the traffic via the specific port, neither the Firewall nor the NAT rules are doing anything except exposing the whole range of Port IDs to the Internet.  (Not happy about that).  Seems like I am asking for trouble.  Yet, on either the FW rule where I define the basic service protocols TCP and UDP - I cannot create more specific instances of these protocols with ONLY my desired port number (45953, for this specific camera).  I have experimented some with trying to use the NAT rule to define the Original Services (TCP, UDP) to a specific port number - and then using PAT - though every instance I try the NAT rules reject me because my Original and Translated Services are not identical.  I argue that they were the same, but there is something in the logic or design of Sophos that I clearly do not understand.

I am using Port 2 for Internet; (also have Port 3 Internet but a different ISP).  And incidentally I'm trying to use DYNDNS to manage my Non-Static IP Addresses on my two ISP connections.

Again - this is a home network. 

Internet WAN - Port #2 - Dynamic IP address

Server (Camera 2) - 172.16.16.82

Services TCP and UDP are default protocols from the list - so they include the entire range. 

My understanding is that the FW is allowing all packets in - and sending to this server -- I also have ZERO idea this afternoon if I am breaking something else on my network such as solicited connections to things like RING cameras, etc. 

And - What happens when I try to add rules for additional cameras ?  I believe based on my perceived logic of this config - that I have no FW nor NAT rule that really understands my desire to filter a single Port # (or small range of ports). 

Below is the Firewall Rule

Again - allowing TCP and UDP packets in but no other logic or filters.

When you finish laughing at me ..... Would love to better understand how to make this work for multiple devices (servers) each with a unique port.  Meanwhile I'm going to disable these rules. 

I did for kicks go to "Shields Up" at grc.com and found that my ports appear CLOSED with the only one OPEN is where the server itself responds.  Of course, I didn't check all of the range of ports to see what else I have exposed...

Thank you for any suggestions.

I'm not a CCNA - have done some work on that over the years, but the way these FW / vendor specific tools work, they don't seem to make logical sense.  And the examples I could find are also seemingly unclear. 

Sincerely,

Chris



This thread was automatically locked due to age.
Parents Reply Children
  • Sorry for the delay.  That is an EXCELLENT recommendation.

    I have been stuck trying to piece together the VPN setup unfortunately - without tons of time nor much luck.

    Which VPN option did you ruse?  IP-SEC or SSL-VPN?  I have set up VPN on Meraki, but (similar concern as I had with port forwarding) - just feels like this is harder than it should be...  LOL - I could do it on Meraki - behind the SOPHOS FW - but then I have the same port forwarding issues that I started with.  LOL 

    Chris

  • I would be interested to know the same.  I have a ton of cameras that I do not want to port forward for all of them.  I have an NVR that will allow access to all of them from the network and a VPN sounds like the easiest and most secure way to accomplish this.   If you get it working, I'd appreciate your experience.

  • Do you have details on how you did this?

  • Hi

    I used SSL-VPN with the OpenSSL app on my iPhone.  I downloaded the VPN profile from the XG user portal, changed one of the 'remote' lines in the .ovpn with my DDNS, i.e., 'remote xxxxx.ddns.net', then sent that to my iPhone where I added it into the OpenSSL app.

    I then connected to my VPN and watched the webcams via the NAS' cam app. I can also use the app from the camera manufacturer to view the camera, all using the local IP address of the cameras.

    This also works with the Tunnelblk app on my MacBook Pro.

  • Hi Brian

    Thanks for that information.  A couple of questions.  Are you using the free "home" version of the Firewall? And version 18?  One of the reasons I ask is because when I walked through both the IP SEC and also SSL - I had difficulty in finding a profile to download from the XG user portal OTHER than an MSI file for Windows (my desktop platform). 

    When you say OpenSSL app on iPhone - do you really mean the OpenVPN app? Or do you have another solution you were using? 

    Sounds like Don Fisher and I are in a similar boat! 

    Many thanks - appreciate your kind and thoughtful reply.

    Chris

  • There are nice guides on youtube from Sophos:

    Sophos XG Firewall (v18): How to configure SSL VPN remote access - YouTube

    Works for Home edition too.

    _______________________________________________________

    Sophos SG 210 with Sophos XG Home - 19.5 GA

    If a post solves your question please use the 'Verify Answer' button.

  • For my Home-XG I use the OpenVPN client on my iPhone.

    Take a look at the SSL VPN guide from Sophos on youtube:

    Sophos XG Firewall (v18): How to configure SSL VPN remote access - YouTube

    _______________________________________________________

    Sophos SG 210 with Sophos XG Home - 19.5 GA

    If a post solves your question please use the 'Verify Answer' button.

  • So here is my follow up on this. 

    I was able to get this to work over the weekend - with some peace and quiet and time to think.  (Imagine that...)

    The You Tube video was pretty good.  I did have to go through it a few times - and I had to make a tweak that I'm not yet comfortable with.  Basically the Destination Zone was LAN and in the video the Destination Network is the "Remote SSL VPN Subnet".  That would work for me when I came in from IOS (iPhone) via WIFI on my local network, and it would easily create the tunnel and I could access the cameras.  When I would turn off WIFI and do the real test from the outside -- it failed.  I had to use "ANY" for the Destination Network in the FW rule. 

    I also had some concerns / questions that I want to get answered -- on the video they use their default 10.80.234.0 / 24 as their "Remote Subnet" and the "Local Subnet" as whatever the servers are that you are trying to access.  So on my home network I was surmizing that "gee - how do I cross these subnets?  Is the FW doing NAT somewhere or (????)  I did try once to use a different subnet in the 172 space, but the FW would not allow me to use that range. (I don't recall the errors).  Just seems like there are nuances of the FW design that I'm not getting - and I guess I need to go post questions in the appropriate places there.

    Also - they describe this as a split tunnel when the Gateway Switch is "OFF" in the VPN settings.  I kept mine that way - assuming that it maintains a split tunnel and (hoping) that only traffic destined for the Local Network servers (cameras) would traverse the tunnel.  False assumption on my part - so I basically would have to turn on/off the Tunnel to look at the cameras - turning the VPN OFF to use anything else on iPhone.  That will not go well with my wife.

    Lastly - in the video they talk about the "Adminstration" then "Device Access" options where you actually need to click on the WAN options for SSL VPN and User Portal - and they give warnings about needing another FW rule.  I am not sure what rule to create there and how to tailor it to the Remote VPN Users...  But - these had to be checked to be used. 

    Honestly part of my gap is trying to dive in the middle of this Sophos world without the specific understanding of how it all fits together - and having questions... 

    I greatly appreciate the suggestions here on the community.  Don - perhaps some of this will help you.  Mine is working yet a "work in progress". 

    Oh - and I also used a resource "www.grc.com/shieldsup" where I could put in the port number for the SSL VPN (port 8443) and test that the port is actually available.

    The other one I struggled with yet only briefly - was logging in via WIFI to the local network and creating the OTP -- once I saw what they were doing it made sense.  As well as editing the OVPN file in Notepad - and altering the IP addresses for the remote host (VPN Server). 

    Really was pretty slick - though still working through details.

    Many thanks for the help.  I will post any updates I have soon. 

    Chris

  • For some reason my email alerts for this thread have stopped.  I just saw the latest.  When I had a company managing my XG125, they configured the VPN connection.  There is a NAT rule and a firewall rule:

  • INT_Network is 192.168.1.0/255.255.255.0, SSL VPN Subnet is 10.80.234.0/255.255.255.0, and the SSL VPN box is checked for WAN in  device access.

Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?