Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DNAT Rule - Alternate incoming SQL Port to standard 1433 port

RE: UTM 9.314

I created a DNAT rule to forward an alternate TCP port (14xx) to an internal SQL Server (at Default TCP Port 1433).

I use SQL Management studio to connect and it works for a while. A day or so later I try again, and it will not work.

The only way I can get it to work again is to restart the UTM 9 router.

I am not sure what I'm missing here but it's driving me crazy.

Not sure if I need another type of NAT to make this work all the time.

Any help would be appreciated.



This thread was automatically locked due to age.
Parents
  • FormerMember
    0 FormerMember

    Hi

    Is DNAT rule configured with an additional WAN IP or with a WAN interface IP?

    It would be great if you can share a snapshot of a DNAT rule here or in PM.

    Could you please take an output of the below command in the shell when the issue persists again?

    Login to shell and run below command: support.sophos.com/.../KB-000038680

    utm:/root # tcpdump -nei any port <alternate TCP port> or port <default sql port>

    eg: utm:/root # tcpdump -nei any port 1444 or port 1433

  • I ran the command (see below). Nothing happened. How do  I view the results?

  • FormerMember
    0 FormerMember in reply to riad63

    You need to execute the command without '#'

    utm:/root # tcpdump -nei any port 1444 or port 1433

    You may also share output of the command suggested by BAlfson.

    utm:/root # zgrep '172\.20\.1\.33' /var/log/packetfilter/2021/03/* |grep drop |tail -10

    where 172.20.1.33 is a local IP of server

    You can post the output here or can also share it via PM.

    Attaching a snapshot for reference.

Reply
  • FormerMember
    0 FormerMember in reply to riad63

    You need to execute the command without '#'

    utm:/root # tcpdump -nei any port 1444 or port 1433

    You may also share output of the command suggested by BAlfson.

    utm:/root # zgrep '172\.20\.1\.33' /var/log/packetfilter/2021/03/* |grep drop |tail -10

    where 172.20.1.33 is a local IP of server

    You can post the output here or can also share it via PM.

    Attaching a snapshot for reference.

Children
No Data