Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DMZ and firewall rules

 Hello all, home user here so please excuse any ignorance, I am learning.

 

I have been using the sophos utm for about a month now and love it so far.  This forum has been a huge help.  I am setting up a teamspeak (and other external servers in the future), but have concerns about security.  So far here is what I did:

1. set up DMZ (10.0.0.0) on its own nic separate from my internal (192.168.2.0) network to put external servers on

2. created a dnat rule    From: Any  service: 1:65536 ->9987 (teamspeak port) going to: external WAN address  Destination: teamspeak server

3. created a firewall rule DMZ ->any -> internet ipv4 & ipv6

4.created firewall rule  Any -> 9987 (teamspeak port) -> Teamspeak server

I also have my internal network set to any ->any

 

Everything is working properly but is my configuration safe?  Is it OK to allow DMZ -> any -> internet and also leave my internal -> any-> any  now that I have a DMZ set up and am hosting an external server?   Is there anything I can do to tighten things up?  



This thread was automatically locked due to age.
Parents
  • Hi Stephen,

    my opinion....

    ...to 1.: OK, that's also best-practise.

    ...to 2.: OK. You could switch from source "Any" to "Internet IPv4" if you have only a public IPv4 address. You should only allow what you need.

    ...to 3.: Not so good. Allow only services and destinations, which are needed by the systems in the DMZ.

    ...to 4.: OK, but you should also switch to "Internet IPv4" if you switch the source in the DNAT rule.

     

    Jas Man

  • Thank you for the response.  I made the recommended changes and will only allow needed services in/out of the DMZ for other items I add in the future.  

Reply Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?