Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

force traffic over webfilter process question, (simple I hope)

Ok so we have a client that has a barracuda 210 and they want all traffic to filter through it regardless of how it connects. I created the DHPC option and published a WPAD.dat but that is not working and barracuda is not very helpful. I was having a conversation with a senior engineer who suggested I can route traffic to it and allow only traffic from the filter out of the firewall. I'm not sure if that is possible. I was going to suggest simply putting the filter inline and physically connect the switch to the filter and the filter would connect to the firewall, but barracuda being the great product that it is has already shown to have issues after losing power. So we don't want the entire network dependent on that device.

 

With all that being said can I create a rule that says all outbound traffic from ip 192.168.0.20-254 go to 192.168.0.3 and all other traffic is allowed out? that way if there is an issue we can turn the rule off remotely.



This thread was automatically locked due to age.
Parents
  • Matt,

    Please update a small network diagram.

    Regards

  • Modem to firewall. Firewall to Switch. Webfilter is on same switch as all the hosts.

  • Matt,

    in order to get your Web Filter working for you users, you need to configure your computers to use it explicit (proxy settings on browsers), so computers redirect their web traffic to it.

    On XG side, you have to create a firewall rule where you allow http/https traffic only from the web filter to internet. For other traffic, like email, ftp, etc..your computers will use their default gateway, which I guess is XG so open the required ports for internal devices (not http and https).

    That's all.

  • That works and I can do that with GPO's however. They want ALL traffic. Guest traffic to go out through the filter. That solution is only viable for systems that I can touch which is why I would like to use the firewall to bounce all 80 and 443 traffic trying to leave back into the filter and only allow filtered traffic out. The reasoning is we can change the rule if something breaks and do not need to send someone on site to change the configuration. I was trying to do the DNS WPAD route and I got it working so it will had out the proxy info but nothing is using it and so I am looking at other routes.

  • HI Matt ,

    You may opt for an option for DNS failover between your Web Filter and XG appliance . So if by chance if your Mail server would fail then the health check would also fail and switch to XG . For this you may need to use domain Name that would link to your Web server as a Primary and XG as a Secondary .

    Make sure that the listening port is the same . I am not sure that you could do in Domain , but here is a third party application for the same.
    http://simplefailover.com/?source=gaw

Reply
  • HI Matt ,

    You may opt for an option for DNS failover between your Web Filter and XG appliance . So if by chance if your Mail server would fail then the health check would also fail and switch to XG . For this you may need to use domain Name that would link to your Web server as a Primary and XG as a Secondary .

    Make sure that the listening port is the same . I am not sure that you could do in Domain , but here is a third party application for the same.
    http://simplefailover.com/?source=gaw

Children
No Data