Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Routing all traffic from LAN to Internet over VPN Tunnel in DMZ

Sophos UTM Configuration

 

 Interfaces

 

External (WAN)       82.x.x.x

DMZ                       10.0.0.1 /8

Internal (LAN)         192.168.0.1 /24

 

 

Network Services - DNS - Global - Allowed Networks

 

DMZ Network

LAN Network

 

Forwarders - DNS Forwarders

 

Google DNS 1

Google DNS 2

 

 

Network Services - DHCP

 

Interface: Internal

 

Range Start: 192.168.0.100

Range end:   192.168.0.110

DNS Server 1: 192.168.0.1

Default Gateway: 192.168.0.1

 

 

Network Protection - Firewall

 

Internal Network -> DNS, http, https, http proxy, http Web Cache, ftp, tftp -> Internet IPv4

 

Internal Network -> Any -> DMZ Network

 

DMZ Network -> Any -> Internet IPv4

 

 

 

NAT - Masquerading

 

Internal Network - External WAN

 

Internal Network - DMZ Network

 

DMZ Network - External WAN

 

 

 

Web Protection - Web Filtering - Global - Transparent Mode

 

Allowed Networks

 

DMZ Network

Internal Network

 

 

 

 

 

DMZ Router (VPN Client) Configuration

 

10.0.0.2

255.0.0.0

GW 10.0.0.1

DNS 10.0.0.1

 

  

VPN Client Router in DMZ with IP 10.0.0.2 is connected with External VPN Service. When i connect my Notebook directly to this Router, and set the following ip configuration manually on Notebook

 

 

10.0.0.5

255.0.0.0

GW: 10.0.0.2

DNS: 10.0.0.1

 

 

I can connect to Internet via VPN Tunnel, works perfect.

 

 

But when i connect my Notebook to Internal LAN Network and get via DHCP IP Configuration, 192.168.0.x i can ping to 10.0.0.1 UTM Interface and Router 10.0.0.2.

 

How do i have to adapt the routing and firewall settings in Sophos UTM, that all the access to Internet is routed from 192.168.0.0 /24 over 10.0.0.0 /8 through VPN Tunnel??

 

 

 

Thanks a Lot!



This thread was automatically locked due to age.
  • You need to also allow the desired protocols (imap, smtp, etc) (or choose Email Messaging service group to catch most email protocols at once) from internal to Internet IPv4 in the firewall rules.


    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.

  • Have this Firewall Rule already from Internal -> Email Messaging Group -> IPv4. Doing telnet IMAP / SMTP from LAN Client works, till I activate Policy Gateway Rule, then Mail Ports are closed on LAN Clients

     

  • Can you find a clue in the firewall log whether the packet might be stopped (or allowed)?


    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.

  • Yes, When Policy Gateway Rule is activated, FW Log information is that access to 993 is Droped.

     

     

    13:51:06

    Default DROP

    TCP

     

    192.168.0.10

    :

    55856

    66.102.1.109

    :

    993

     

    [ACK PSH]

    len=87

    ttl=63

    tos=0x00

    srcmac=78:31:c1:bd:69:b4

    dstmac=00:0e:c4:d2:7d:fd

     

     

    I add then for testing DMZ Network -> ANY - > Internal Network FW Rule, but still get Droped

     

     

    Dont know what else can be interfering?

  • I believe 192.168.0.0/24 is your internal network, the above example shows that from your host 192.168.0.10 outgoing traffic to 66.102.1.109 (which is Internet IPv4) on port 993 is default dropped. That would indicate that you don't have a firewall rule allowing the traffic on port 993 (IMAP SSL).

    Maybe IMAP SSL is not inside your Email Messaging group...

    See my picture on how the firewall rule should look like (I also ticked 'Log traffic' so that if it is allowed, it will also be displayed in the firewall log).


    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.

  • Please see here the Firewall Rules

     

    Yes, Internal Network is 192.168.0.0 /24

     

    Email Messaging Group has the Services

     

    IMAP / 143

    IMAP SSL / 993

    POP 3 / 110

    POP3 SSL / 995

    SMTP / 25

    SMTP SSL / 465

     

     

     

    When I disable the Gateway Route the Client can connect, please see here

     

     

    When I enable the Gateway Route again, the same Client is Droped

     

     

    Here is also the Config of the Gateway Rule

     

     

     

  • Could you create another firewall rule (like 6) but instead of using Internal (Network) as source create a new "Network" definition also als 192.168.0.0/24 and make sure that under Advanced interface is listed as << any >> (this is default).

    It's a little bit a guess, but please try this and let us know what happens.


    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.

  • Created yet the following

     

     

    Deactivated Rule 6 and add this instead

     

     

    Same Result, when i activate Policy Route , surfing over VPN Tunnel work, but Mail Ports closed, and FW Log show Drop

     

     

    When disabling Policy Route, eMail works fine Ports are Open, but surfing over VPN Tunnel did not work 

     

  • Interesting , when I Replace in Rule 6 Destination Internet IPv4 with Any then it works, Surfing over VPN Tunnel, and Email are working. But what I don't understand why? All my Rules have as Destination Internet IPv4 ??
  • Good that it works now and indeed a little strange since you had both internal -> internet IPv4 and internal -> dmz and dmz -> internet IPv4 allow rules IIRC.

    Perhaps someone can explain why in this case specifically "any" is required, I don't have an explanation for it.


    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.