Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Blocking access from internal range to an internal host is NOT working!

Hello,

I am having difficulty in blocking internal IPs from accessing services on another internal IP. The rule seems to have no affect whatsoever.

I have a UTM 9 with remote access (SSL VPN) setup in such a way that users logging in get static IPs mapped to them via the documented SNAT<-->DNAT rules for doing so; it SNATs the user network to a static IP, and a DNAT rule to replace the static IP with the user's network IP. This is working fine, and 192.168.1.x IPs via SSL VPN are mapped correctly to 10.100.1.x IPs. I am able to connect to hosts within the network from these IPs.

However, when I add a rule in the firewall to block all access from the "virtual static IPs" 10.100.1.2 - 10.100.1.5, for ALL services, to host 10.100.100.2, they have no affect at all. I tried both DROP and REJECT to no avail. I have tried removing the range and trying just one IP with no affect either. I don't know what I'm doing wrong. I am new to Sophos UTM, but these rules seem self-explanatory.

The rule is added at the bottom of the firewall list - AFTER the SNAT<-->DNAT rules are performed - although for efforts sake, I attempted to block the assigned SSL VPN IP from accessing the host and it too had no affect. I tried adding it to the top of the list as well and it did not work either.

What am I doing wrong here? Why am I unable to block hosts internally from communicating? I split these "virtual static IPs" into groups so that I could filter access from the VPN to internal hosts the users are permitted to contact and none else. However I am unable to implement this policy because the firewall does not seem to be working as it should.

Any help please?

 

Thank you!

Brian J



This thread was automatically locked due to age.
  • You can assign static VPN IPs to IPsec, L2TP/IPsec and PPTP Remote Access clients.

    If you use SSL VPN Remote Access, you cannot assign fixed IPs, but you can make separate Profiles allowing restricted access to specific users.  Assume that "Brian" is in three different Profiles.  When he logs into the SSL VPN, he will have access via automatic firewall rules to items in each of the Profiles.  In this way, you can get rid of all those NAT rules and replace them with a single Masquerading rule.  The UTM manages the access, not the jump box - all it has to do is limit access to the primary IP on the UTM interface in its subnet.

    You might not need the DNATs using your current approach as the UTM is a stateful firewall.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?