Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

firewall rules without NAT/MASQ

I'm in the phase of evaluating Sophos UTM as the standard firewall product for a large company. One thing that I stumbled upon - and which would be a show stopper - is that you can't use any firewall rules without activating masquerading. Though for many users this seems logic as they want to hide their private IP address space behind a public IP. But in my case I just want to have a firewall between two networks without doing NAT.

When setting up the UTM through the initial wizard it automatically created a MASQ rule on the WAN interface. As I didn't want that I removed that rule in the next step. Then I created firewall rules (like allow ping from any4 to any4). The hosts on the LAN side can't ping anything on the WAN side. While troubleshooting I tried many things, nothing helped until I re-entered the MASQ rule.

Is MASQ/NAT required for the firewall to work? If so, why? Is there a workaround to get firewalling without NAT (like activating MASQ but also creating a NAT excemption rule)? Firewall in bridge mode is no option as I don't need a transparent firewall but a device routing between two different IP networks.

Also I have noted that I can't add a default route the traditional way. If I create a route to 0.0.0.0/0 UTM tells me that I have to do that via the WAN interface (checkbox default gateway). I could live with that but I can think of situations where this would be counter-productive. Fun fact here: when SSHing into the UTM and issuing 'netstat -arn' I don't see the default rule. Why is that?



This thread was automatically locked due to age.
Parents
  • Hi,

    By default, masquerading is required to communicate with the internet resources unless the UTM is deployed in a bridge mode and there is a separate gateway that suffices the web request. This is not a UTM behavior but how things work technically. You cannot access external resources with your internal IP address floating in the WAN. 

    In UTM, the source address is only translated if the packet leaves the gateway system via the specified interface. Note further that the new source address is always the current IP address of that interface (meaning that this address can be dynamic).

    Thanks

    Sachin Gurung
    Team Lead | Sophos Technical Support
    Knowledge Base  |  @SophosSupport  |  Video tutorials
    Remember to like a post.  If a post (on a question thread) solves your question use the 'This helped me' link.

Reply
  • Hi,

    By default, masquerading is required to communicate with the internet resources unless the UTM is deployed in a bridge mode and there is a separate gateway that suffices the web request. This is not a UTM behavior but how things work technically. You cannot access external resources with your internal IP address floating in the WAN. 

    In UTM, the source address is only translated if the packet leaves the gateway system via the specified interface. Note further that the new source address is always the current IP address of that interface (meaning that this address can be dynamic).

    Thanks

    Sachin Gurung
    Team Lead | Sophos Technical Support
    Knowledge Base  |  @SophosSupport  |  Video tutorials
    Remember to like a post.  If a post (on a question thread) solves your question use the 'This helped me' link.

Children
  • sachingurung said:

    Hi,

    By default, masquerading is required to communicate with the internet resources unless the UTM is deployed in a bridge mode and there is a separate gateway that suffices the web request. This is not a UTM behavior but how things work technically. You cannot access external resources with your internal IP address floating in the WAN.

    Unfortunately I have to disagree! You are right on the fact that NAT would be necessary when connecting a private IP address space to the Internet as of course RFC1918 IP address space will be dropped by any ISP router. But that was not my question - please read careful.

    I don't want to use the Sophos UTM to connect to the Internet but want to have some firewalling capabilities for traffic between two private IP address spaces. Imagine you would put a firewall between your datacenter and the user network. What should I do then? Create 1:1 NAT rules for every server in the datacenter? Spill hundreds of IP addresses for those 1:1 NAT rules? Clients reaching datacenter services through IP addresses different to the IP addresses used in the datacenter making support an unmanageable situation. Think of that...

    Deployment in bridge mode on the other hand is having the same IP network on both sides of the firewall. Most vendors call that transparent firewall. That could be the workaround for the datacenter example I gave but noone in the IP world would address the example given with a transparent firewall.

    Please think a bit outside of your box. The problem I have at hand is that I have an upstream firewall that does the NAT. The Sophos UTM is intended to separate the secure network behind the upstream firewall from a development/test network where anything can go wrong and I want to protect the network from that. Double NAT is bullshit and services like SIP will not work in such a situation. Bridge mode between secure and dev network is also unwise as it would require a complete IP address migration on 200 machines.

    It all might come to a simple answer: Sophos UTM is not the right product for my purpose (as virtually every other vendor can do firewalling without NAT). As there is a strong inclination to Sophos UTM I would have to tell my boss why we can't use it for the problem at hand. So I'm still asking: Why is MASQ required for firewalling? If the answer is: "by design" then I have something at hand. Anyway I'm still open to workarounds.

    Thanks so far for the effort sachingurung!

  • I will do some testing if I get time, but I have no idea why you would not be able to disable MASQ and just use routing to handle everything you describe.  Perhaps you need to remove the default gateway in the internet setup and then add a static route manually?  If all you want to do is act as a firewall between two internal networks, why deploy a UTM device at all?  You could to the very same thing using something like iptables with FirewallBuilder and get just as good of results for simple firewall functionality.

Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?