![]() ![]() Also, be sure to post a comment below if you have particular questions on how to make something work in the Sophos UTM or how it compares with other UTMs and firewall appliances as we test and play around with many of them out there. More posts will follow on specific Sophos UTM functionality. Hopefully this post will shed light for any who are looking to setup a port forward/NAT rule to allow access to specific hosts and services inside your network. The Sophos UTM is an extremely powerful and easy to use UTM appliance that offers tons of customizable settings for securing your network. This is an extremely powerful and easy to find log that I use is just about any troubleshooting of blocked traffic with Sophos UTM. You can see the live firewall log by clicking Network Protection > Firewall > Open Live Log and you will see real time logs of blocked network traffic. In fact, if you don’t have a NAT rule setup quite right, you will see it getting blocked in the firewall log. CPU: 1.5+ GHz (I recommend Intel Core if you have > 250Mbit/sec bandwidth at home) RAM: 1GB (I recommend 4GB ) HDD: 60GB+. In troubleshooting any NAT or other rules relating to the firewall, you can easily see in the Live firewall log what is going on and if your NAT rule is working or not. I wish I had a home connection of 125 Mbps down, but for my 20 Mbps connection it works fine and people on the Ubiquiti forums report much higher speeds do work for the most part. While it is primarly a 3 port router it is a fork of Vyatta. Just keep in mind that the NAT/port forward will essentially make a particular host visible to the outside world. Assuming you can use hardware offloading with your network, look into an EdgeRouter Lite. The above process in general should work for just about any service you are looking to have accessed from the outside into your network. It is convenient as well in testing, to be able to not have to rip a rule out to test in troubleshooting, you can simply “deactivate” the rule using the green slider. This is a feature that can be frustrating when you don’t remember to turn it on, however, once you get the hang of doing this in Sophos UTM, it becomes second nature. If you don’t do this, you will basically have a rule sitting there that is present but not being processed, so it won’t work. Also, once you save the rule, make sure that you have the green slider slid to the right, which effectively turns the rule on. The comment field is also handy as this will help you easily identify a specific NAT rule from others if you have others in the list. Be sure to select the Automatic Firewall rule check box as this will automatically add any needed firewall rules that may be necessary to make the NAT rule work which is a convenient feature.Īfter you setup the rule as specified above, make sure you save.And the service to we specify the same port range here that we did in the “using service” under the matching conditions. ![]() Under the Action heading and change the destination to we have specified the internal host here 192.168.1.149 that we intend to accept requests for RDP traffic. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |