Hello, experts,
I'm running UTM 9.405-5 at home, and it works like a charm. I just got a work-from-home kit, but I can't seem to get the remote access point (Aruba Networks RAP-3WNP) to connect to my corporate network, while behind the Sophos UTM. At first, I thought the RAP device might be messed up, so I unplugged the UTM and plugged the RAP device right into my cable modem. Of course, the RAP device connected, allowed my Avaya phone to get an IP address, and started broadcasting an SSID that connects me to my corporate network. After that test, I think it's fair to say that the problem is the UTM configuration.
I tried checking the Firewall Live Log, just to see what was being blocked, so that I could open it, but I don't see anything related to the RAP device, when it's booting; although, I clearly see activity on the device (and phone handset). At first, I saw a lot of 60001 and 60003 fwrule entries. After some research, I created two rules: one to allow all traffic from my network to the corporate controller's public IP, and another to allow all traffic from the corporate controller's public IP into my network. I also created a DNAT rule to forward all traffic from the corporate controller's public IP to the RAP device and Log All Initial Packets. After those initial changes, if I View Log or Search Log Files, I see only packet logged entries (i.e. nothing dropped), but the RAP device still doesn't work:
2016:09:07-09:20:32 utm ulogd[21205]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="76" tos="0x00" prec="0x20" ttl="55" srcport="43900" dstport="80" tcpflags="SYN"
2016:09:07-09:20:48 utm ulogd[21205]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="60" tos="0x00" prec="0x20" ttl="55" srcport="44466" dstport="80" tcpflags="SYN"
2016:09:07-09:22:03 utm ulogd[21205]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="60" tos="0x00" prec="0x20" ttl="55" srcport="48169" dstport="80" tcpflags="SYN"
2016:09:07-10:20:47 utm ulogd[25635]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="76" tos="0x00" prec="0x20" ttl="55" srcport="24745" dstport="80" tcpflags="SYN"
2016:09:07-11:21:42 utm ulogd[30013]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="76" tos="0x00" prec="0x20" ttl="55" srcport="45312" dstport="80" tcpflags="SYN"
2016:09:07-14:21:25 utm ulogd[10478]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="76" tos="0x00" prec="0x20" ttl="55" srcport="13718" dstport="80" tcpflags="SYN"
2016:09:07-14:21:28 utm ulogd[10478]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="60" tos="0x00" prec="0x20" ttl="55" srcport="13857" dstport="80" tcpflags="SYN"
2016:09:07-15:21:25 utm ulogd[14738]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="76" tos="0x00" prec="0x20" ttl="55" srcport="41634" dstport="80" tcpflags="SYN"
2016:09:07-15:21:49 utm ulogd[14738]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="60" tos="0x00" prec="0x20" ttl="55" srcport="42888" dstport="80" tcpflags="SYN"
2016:09:07-15:23:02 utm ulogd[14738]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="60" tos="0x00" prec="0x20" ttl="55" srcport="47078" dstport="80" tcpflags="SYN"
2016:09:07-16:21:59 utm ulogd[14738]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="76" tos="0x00" prec="0x20" ttl="55" srcport="27910" dstport="80" tcpflags="SYN"
2016:09:07-16:22:02 utm ulogd[14738]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62005" initf="eth0" srcmac="00:11:22:33:44:55" dstmac="66:77:88:99:aa:bb" srcip="11.22.33.44" dstip="55.66.77.88" proto="6" length="60" tos="0x00" prec="0x20" ttl="55" srcport="28016" dstport="80" tcpflags="SYN"
I think I'm getting close, because I no longer see any 60001 or 60003 entries, but I can't find any information on the 62005 rules, and - at the end of the day - I still don't have remote access to my corporate network.
I tried running a Wireshark session, looking for the local IP address, MAC and wireless MAC addresses of the RAP, on both my hardwired and wireless adapters, but I couldn't find anything helpful.
- Has anyone successfully gotten a RAP3 device to work behind the Sophos UTM?
- If so, what rules do I need to create?
- What does that 62005 fwrule mean?
- Can anyone provide ideas as to how I can find out what's going on between the RAP device, the UTM and the corporate controller?
- If I can see what's being blocked, it might help me figure out what to open up.
Any and all help would be much appreciated!
This thread was automatically locked due to age.