Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

v19.0.1 - Drop & log Rule allows traffic 80/443/3128

Due a log investigation, we have discovered a leak in the firewall policys.

If you set a rule with simply complete drop & log from a source to WAN zone, Traffic with destination Ports 80/443 will be allowed. So the traffic flows to the integrated proxy and is processed. It translates the Traffic to Port 3128 (seen in Webfilter logs) while it uses a WEB Rule ID 2 (deny all).

So the blocked computers are able to access websites from the exception tab (specially M365 Onedrive & Co could be critical for T0 Servers). 

Recommendations for MS especially include exceptions for all HTTPS dec/cert val/Malware/ZeroDay/Policy checks

Does anyone have a solution for this? It seems to be a design thing,



This thread was automatically locked due to age.
Parents
  • Hi,  Previously kind of similar issue was reported for the Country blocking rule by selecting it in destination for LAN to WAN rule and traffic was showing in log viewer allow due to proxy integration, I am suspecting this could be related to the same, and may get fix in V19.0.2 MR-2 with reference ID  - NC-95861.

    As of now in the rule select action "reject" (in place of drop action)  if that helps you.

Reply
  • Hi,  Previously kind of similar issue was reported for the Country blocking rule by selecting it in destination for LAN to WAN rule and traffic was showing in log viewer allow due to proxy integration, I am suspecting this could be related to the same, and may get fix in V19.0.2 MR-2 with reference ID  - NC-95861.

    As of now in the rule select action "reject" (in place of drop action)  if that helps you.

Children
No Data