Doing some VPN testings and i've found somthing odd out.
While mounting a VPN with all traffic routed through the tunnel (DNS included) and the UTM firewall configured with
Firewall --> Advanced --> Spoof protection: Strictthen every DNS queries from any SSL VPN client (road warriors) are dropped by the firewall stating "Spoofed packet".
Also, is there any paper or document available onto the connectivity cascade with the UTM? by this i mean something like what happend if you have web filtering rules for some subnet/hosts ON but no NAT on that subnet and no specific firewall rules for that subnet either.. Well im trying to figure out how the divers possible rule sets are traversed indeed.
Thanks,
regards,
m.
This thread was automatically locked due to age.