Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Port forward to web server

I have Website published on IIS as http on port 8888.

I added it as Web Server and created business role add authentication method.

I can access the website on new port 8887 from Lan, when i tried to access the website using Public ip from wan didn't worked.

I tried to create DNAT for the new port but still face the same problem.

 

Regards,

Peter Zaher 



This thread was automatically locked due to age.
Parents
  • Please post your rule with external address masked.

  • if i map port to iis direct working fine, but i need to use sophos authentication 

  • Hi Peter, 

    Could you share the traffic details by running the command via console 

    console>tcpdump 'port 8888 or port 8886 or port 8887

  • Hi Aditya

     

    here is the tcpdump

     

    console> tcpdump 'port 8888 or port 8886 or port 8887
    tcpdump: Starting Packet Dump
    21:51:40.692412 Port1, IN: IP 10.10.3.101.21855 > x.x.x.x.8886: Flags [S], seq 2424152625, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:40.794167 Port1, IN: IP 10.10.3.101.21856 > x.x.x.x.8886: Flags [S], seq 69424576, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:41.044866 Port1, IN: IP 10.10.3.101.21857 > x.x.x.x.8886: Flags [S], seq 1433312481, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:43.692415 Port1, IN: IP 10.10.3.101.21855 > x.x.x.x.8886: Flags [S], seq 2424152625, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:43.794659 Port1, IN: IP 10.10.3.101.21856 > x.x.x.x.8886: Flags [S], seq 69424576, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:44.044946 Port1, IN: IP 10.10.3.101.21857 > x.x.x.x.8886: Flags [S], seq 1433312481, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:49.692797 Port1, IN: IP 10.10.3.101.21855 > x.x.x.x.8886: Flags [S], seq 2424152625, win 8192, options [mss 1460,nop,nop,sackOK], length 0
    21:51:49.794194 Port1, IN: IP 10.10.3.101.21856 > x.x.x.x.8886: Flags [S], seq 69424576, win 8192, options [mss 1460,nop,nop,sackOK], length 0
    21:51:50.045069 Port1, IN: IP 10.10.3.101.21857 > x.x.x.x.8886: Flags [S], seq 1433312481, win 8192, options [mss 1460,nop,nop,sackOK], length 0
    21:52:06.844075 Port1, IN: IP 10.10.3.101.21871 > x.x.x.x.8886: Flags [S], seq 1675063050, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:52:07.195710 Port1, IN: IP 10.10.3.101.21872 > x.x.x.x.8886: Flags [S], seq 1460055637, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:52:09.843587 Port1, IN: IP 10.10.3.101.21871 > x.x.x.x.8886: Flags [S], seq 1675063050, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:52:10.196683 Port1, IN: IP 10.10.3.101.21872 > x.x.x.x.8886: Flags [S], seq 1460055637, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    ^C
    13 packets captured
    13 packets received by filter
    0 packets dropped by kernel

Reply
  • Hi Aditya

     

    here is the tcpdump

     

    console> tcpdump 'port 8888 or port 8886 or port 8887
    tcpdump: Starting Packet Dump
    21:51:40.692412 Port1, IN: IP 10.10.3.101.21855 > x.x.x.x.8886: Flags [S], seq 2424152625, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:40.794167 Port1, IN: IP 10.10.3.101.21856 > x.x.x.x.8886: Flags [S], seq 69424576, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:41.044866 Port1, IN: IP 10.10.3.101.21857 > x.x.x.x.8886: Flags [S], seq 1433312481, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:43.692415 Port1, IN: IP 10.10.3.101.21855 > x.x.x.x.8886: Flags [S], seq 2424152625, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:43.794659 Port1, IN: IP 10.10.3.101.21856 > x.x.x.x.8886: Flags [S], seq 69424576, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:44.044946 Port1, IN: IP 10.10.3.101.21857 > x.x.x.x.8886: Flags [S], seq 1433312481, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:51:49.692797 Port1, IN: IP 10.10.3.101.21855 > x.x.x.x.8886: Flags [S], seq 2424152625, win 8192, options [mss 1460,nop,nop,sackOK], length 0
    21:51:49.794194 Port1, IN: IP 10.10.3.101.21856 > x.x.x.x.8886: Flags [S], seq 69424576, win 8192, options [mss 1460,nop,nop,sackOK], length 0
    21:51:50.045069 Port1, IN: IP 10.10.3.101.21857 > x.x.x.x.8886: Flags [S], seq 1433312481, win 8192, options [mss 1460,nop,nop,sackOK], length 0
    21:52:06.844075 Port1, IN: IP 10.10.3.101.21871 > x.x.x.x.8886: Flags [S], seq 1675063050, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:52:07.195710 Port1, IN: IP 10.10.3.101.21872 > x.x.x.x.8886: Flags [S], seq 1460055637, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:52:09.843587 Port1, IN: IP 10.10.3.101.21871 > x.x.x.x.8886: Flags [S], seq 1675063050, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    21:52:10.196683 Port1, IN: IP 10.10.3.101.21872 > x.x.x.x.8886: Flags [S], seq 1460055637, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    ^C
    13 packets captured
    13 packets received by filter
    0 packets dropped by kernel

Children