I am trying to get a static route working. First of all I have 4 offices with an SG 330 at the main office and 125s and a 135 at the others. The office connections are connected via a private network, no internet involved. I have traffic routing to and from the offices on LAN, phone, wireless, and guest wireless subnets. What I need is to route all Internet traffic from the remote office lan and wireless subsets back out through the main office. I have the offices connected on eth5, with eth0 being LAN, and eth1 being WAN. I cannot use the WAN, eth1 for this traffic on the UTM 135. Coming from our Sonicwalls this was easy, but the Sophos interface is quite different. Any ideas to get me in the right direction?
Office A
LAN eth0 10.0.58.0
WAN eth1 ISP to Internet
NLAN(inter-office connectivity) eth5 ip 192.168.200.1
There is no gateway involved in the NLAN. It just connects the UTMs.
Office B
LAN eth0 10.0.50.0
WAN eth1 DR link
NLAN(inter-office connectivity) eth5 ip 192.168.200.2
There is no gateway involved in the NLAN. It just connect the UTMs.
The routes I have set up are gateway routes saying Office A going to Office B use the Office B gateway (192.168.200.2) and Office B to Office A use the Office A gateway (192.168.200.1). There is no NAT between offices.
What I cannot get is the Internet from Office B back though Office A.
Also, a question on differences in the Sophos vs the Sonicwalls. The Sonicwalls default firewall traffic on zones. Example, LAN to WAN - Any>Any>Allow and WAN to LAN - Any>Any>Deny. We would then close or open traffic based on our needs in the appropriate direction. The Sophos seems to block all until the traffic is set up to be allowed. Little easier to start off on the Sonicwalls. Thoughts on this approach(maybe start the Sophos this way)? Maybe it is just the familiarity I have been use too.
This thread was automatically locked due to age.