I have attempted my first XG configuration to put an AT&T VPN gateway (IPsec, I believe) with an extensive set of required management rules into a DMZ.
XG DMZ interface is 10.255.168.1, VPN gateway WAN interface is 10.255.168.2
First off I am unable to ping the XG interface from the VPN gateway; the VPN gateway believes that it has no internet connectivity and won't go online.
I am not sure how to log the traffic to diagnose if things are configured correctly and if so to troubleshoot the rules that I have written. Any guidance one can offer would be appreciated.
Port Protocol Direction Address Application NetGate Code version
ESP(50) in/out Any (Tunnel IPSEC All
Server IPs)
9 UDP,TCP out 12.67.1.68 Bandwidth tests (CoS) (US)
32.114.25.44 � � (AP)
32.112.48.164 � � (EMEA)
At least one time server address should be permitted, preferably multiple addresses for redundancy.
13 TCP in/out 208.66.175.36 STP (Simple Time Protocol) 1.5+
207.200.81.113
206.246.118.250
198.60.73.8
192.43.244.18
173.14.47.149
132.163.4.103
132.163.4.102
132.163.4.101
131.107.13.100
129.6.15.29
129.6.15.28
128.138.188.172
128.138.140.44
69.25.96.13
68.216.79.113
64.236.96.53
64.147.116.229
64.125.78.85
64.113.32.5
64.90.182.55
ICMP type20 out 129.37.4.131 Proactive Monitoring (US and AP)
129.37.4.71 � � (US)
165.172.132.76 Proactive Monitoring (Canada)
32.112.12.83 Proactive Monitoring (EMEA)
32.112.12.51 � �
ICMP type21 in 129.37.4.131 Proactive Monitoring (US and AP)
129.37.4.71 � �
165.172.132.76 Proactive Monitoring (Canada) All
32.112.12.83 Proactive Monitoring (EMEA)
32.112.12.51 � �
20 TCP in 165.87.194.246 FTP Data for Code Updates All
165.87.194.243
21 TCP out 165.87.194.246 FTP for Code Updates All
165.87.194.243
22 TCP in 129.37.4.0/24 SSH Remote Management All
53 UDP out ISP and AT&T DNS WAN connectivity test/dns_ping 1.6+
443 TCP in 129.37.4.0/24 HTTPS Remote Management All
** Customer specific or 3rd party support subnets may need to be added **
500 UDP in/out Any (tunnel IPSec ISAKMP negotiaion All
Server IPs)
4500 UDP in/out Tunnel server IP NAT-T (when ESP protocol 50 is blocked � added in v5.2.600)
5080 TCP out 204.146.172.225 RIG/SVCMGR - Auth. All
204.146.166.105 "
204.146.172.226 "
204.146.219.1 "
204.146.172.230 �
204.146.166.107 �
(Or see Global RIG List)
5081 UDP in/out 204.146.172.225 RIG Query Pre-1.4
204.146.166.105 "
204.146.172.226 "
204.146.219.1 "
204.146.172.230 �
204.146.166.107 �
(Or see Global RIG List)
8080 TCP in 129.37.4.0/24 Secure Support Interface v1.5 through v5.3
9920 TCP in/out 144.160.245.70 Remote Access Repository All
129.37.0.113
32.97.118.242 (removed from service)
This thread was automatically locked due to age.