I created a rule and now I can't access the web portal and I am looking for a way to disable the rule I created via the CLI.
Thanks.
This thread was automatically locked due to age.
I created a rule and now I can't access the web portal and I am looking for a way to disable the rule I created via the CLI.
Thanks.
I figured out a workaround, luckily the NAT reflection rule only applied to outbound traffic internally. A quick walk to the coffee shop and a 3 dollar cup of coffee helped me solve the problem since the rule didn't apply to inbound traffic and my firewall admin console is publicly available. I'll be sure and create snapshots before applying risky rules like this. It would still be helpful to know how to disable policies via CLI.
I figured out a workaround, luckily the NAT reflection rule only applied to outbound traffic internally. A quick walk to the coffee shop and a 3 dollar cup of coffee helped me solve the problem since the rule didn't apply to inbound traffic and my firewall admin console is publicly available. I'll be sure and create snapshots before applying risky rules like this. It would still be helpful to know how to disable policies via CLI.
Hi Leon.Friend,
Sorry for replying on this old threat but it helped me very well. However some important information is missing from the answer.
This command "system appliance_access enable" helped me get back into a customers XG Firewall located in Azure after we were locked out due to the wrong firewall rule being created. After disabling the firewall rule which disallowed us the access we disabled the command again with "system appliance_access disabled" as you suggested is very important.
However the important information that ALL the internet packets will be dropped after the command is ran is missing from the answer.
Also after performing the command, their will be no sort of 2nd confirmation that the firewall will drop ALL this traffic.
It will just be a note saying this and start dropping all the internet traffic straight away:
Now if you have a local Firewall this does only mean there's no internet for the organisation behind it for a brief moment while you regain access and disable the rule.
But if you're running this command remotely it means you completely lose access to the firewall's webadmin if you access it through the internet if you don't have a back-up connection as we had in Azure
I'm surprised the KB article doesn't warn you for this: https://community.sophos.com/kb/en-us/123542 / https://community.sophos.com/kb/en-us/133677
I'll also suggest editting the KB article.
Stay safe,
Regards,
Sander