Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

External IP shows as internal DMZ IP when using "Remote_Host" HTTP variable

As per the subject really

On my old FW (not Sophos) I used to allow access to pages internally (to our network) by checking the remote host http variable. This would give the users external (in the case of an external IP) or the internal (192.168.0.x) of an internal user. So I could lock out pages to external users

With Sophos UTM9 installed the remote_host is always shown as the DMZ IP address - 192.168.1.1. Therefore my apparantly secure pages are now visible externally

Is there a way to make this work as it used to? I can't see that NATing will help me in anyway

 

 

 

 

 



This thread was automatically locked due to age.
Parents Reply Children
  • Thanks. But could I not have NAT rules for only these services POP3/POP3 SSL/SMTP/SMTP SSL so that the mail server could see the real originating IP Address?

  • I'm lost, Mike.  We're in the Webserver forum, but your last comment is about email.

    Cheers - Bob

  • I see now, Mike.  Yes, you want to use DNATs instead of Full NATs.  If a DNAT doesn't work, then I'll guess that "mail.xxxxx.com" violates #3 in Rulz.  Also, I don't think you want the SNAT - if it's needed as noted, then there might also be a violation of #3 through #5.

    Cheers - Bob

  • I was violating Rule 3 and I have now edited the network definitions and removed the Bound To, and now they all are Bound To <Any>

    I have rewitten the NATs to

     

    DNAT. Any -> SMTP -> External WAN (www.mycompany.com). DNAT -> mail.mycompany.com

    DNAT. Any -> SMTP SSL -> External WAN (www.mycompany.com). DNAT -> mail.mycompany.com

     

    These work (I can't see whether the email server is seeing the real IP address or not though at the moment)

    I still have this

     

    Full NAT. Any -> POP3 SSL -> External WAN (www.mycompany.com). Full NAT ->

    Source: Green (Address)

    Destination: mail.mycompany.com

     

    If I remove this Full NAT then my email server won't allow me to RECEIVE email and I get an error within Outlook. Turning it back on, and then I can receive okay again

  • I can also confirm I am now seeing the external originating IP address of the sender. Goooooooood!

    So the question really just remains about that Full NAT. Is that okay or is something wrong with it?

     

    I also now realise my original question to you was a load of rubbish! All my NATs are dealing with email, and none of them for the web! How stupid can I be?!

    Bearing in mind I do *not* have Web Filtering turned on, what NATs would I need so that my web server would see the originating brower's IP address. I am using the X-FORWARDED-FOR header as a filter, but it would nicer if I could really see the originating address instead of using that header

  • I have also noticed that the only firewall rules I have for the DMZ (where the web and email server is located) are

    Orange Network -> Web Surfing -> Any

    Orange Network -> DNS -> Any

    There's nothing for email! But email works!?

     

    On Green (where my users are)

    Green Network -> Any -> Any