Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

firewall rules without NAT/MASQ

I'm in the phase of evaluating Sophos UTM as the standard firewall product for a large company. One thing that I stumbled upon - and which would be a show stopper - is that you can't use any firewall rules without activating masquerading. Though for many users this seems logic as they want to hide their private IP address space behind a public IP. But in my case I just want to have a firewall between two networks without doing NAT.

When setting up the UTM through the initial wizard it automatically created a MASQ rule on the WAN interface. As I didn't want that I removed that rule in the next step. Then I created firewall rules (like allow ping from any4 to any4). The hosts on the LAN side can't ping anything on the WAN side. While troubleshooting I tried many things, nothing helped until I re-entered the MASQ rule.

Is MASQ/NAT required for the firewall to work? If so, why? Is there a workaround to get firewalling without NAT (like activating MASQ but also creating a NAT excemption rule)? Firewall in bridge mode is no option as I don't need a transparent firewall but a device routing between two different IP networks.

Also I have noted that I can't add a default route the traditional way. If I create a route to 0.0.0.0/0 UTM tells me that I have to do that via the WAN interface (checkbox default gateway). I could live with that but I can think of situations where this would be counter-productive. Fun fact here: when SSHing into the UTM and issuing 'netstat -arn' I don't see the default rule. Why is that?



This thread was automatically locked due to age.
Parents
  • OK guys, many thanks for your help and suggestions so far. unfortunately it didn't help. anyway I'd like to update to everyone...

    @: this was my very first idea when confronted with the problem. but Sophos UTM doesn't let you do that. uncheck the "default gateway" checkbox from the WAN interface, go to static routes and add a network 0.0.0.0/0 and it tells you "default gateway can only be defined via the checkbox in interface settings". that is the reason why i was specifically mentioning that Sophos "raped" the routing of the underlying Linux and the default gateway doesn't show up on "netstat -arn".

    @: you are right on the "forward ping" checkbox but the "utm is pingeable" has nothing to do with that - that is to being able to ping the outside interface from the Internet. anyway i played with all checkboxes earlier and nothing helped.

    @: i completely wasted an hour of my time by putting the firewall in bridge mode. i noticed a big flaw in the approach because I can't define which bridge leg is outside and which is inside. in this configuration the firewall is prone to man-in-the-middle-attacks. i can't even imagine how one could use the Sophos in transparent mode with that in mind. really dangerous!!! anyway a complete waste of time as the problem is essentially the same: as long as i haven't created a MASQ rule no traffic is forwarded through the firewall.

    i still have two ideas about the problem: it is a BUG in UTM 9.4 or the "raped routing" has a problem with egres of RFC1918 IP addresses to the Internet. then this would be a feature and the "MASQ trick" is the BUG. i'll keep you updated...

  • Without NAT , you're adding a router and its internal LAN(s) to your existing network.

    Routing to these new internal LANs must be setup on your existing network.  Either use static routes , or a routing protocol like OSPF

Reply Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?