We'd love to hear about it! Click here to go to the product suggestion community
We have a small team of web developers, each has a VM running locally that they develop on.
The VM's need unauthenticated outbound access so they simulate the production environment. We currently have IP reservations for the VM's and rules set up to allow those IP's out unauthenticated but the Dev's are now visiting various other corporate sites so we would potentially need to set up IP reservations (we have about a hundred DHCP scopes across the company) and rules accordingly. It seems like a fair bit of overhead. especially as they rebuild the VM's relatively often so we have to change the IP reservations.
I have created a MAC address definition containing all the MAC's but i don't seem to be able to add it like a network definition.
If possible i would like to allow the MAC outbound unauthenticated so it does not matter where they are or what IP they have. On rebuild its just a case of updating the definition with the new MAC.
Can this be done?
NB. We used to have the VM's hosted in Hyper-V/VMWare centrally but for one reason and another they are now local to their machine.
Hi geoff morgan,
And Welcome to the community.
I feel you are thinking too strictly about this, and thought how could you get what you need.
I would create a new subnet that has unrestricted access.
someone else will most probably have an ingenious way of accomplishing your needs, but this new subnet would be the simplest to manage.
In reply to Argo:
We already have multiple subnets for clients & servers. Server subnets are configured to allow unauthenticated outbound, client subnets are not but i need a way to allow a VM outbound unauthenticated from any office and Not allow general users outbound unauthenticated.
We are a national company with offices dotted all over. The VM could potentially be on any subnet.
In reply to geoff morgan:
The MAC address is lost as soon as a packet is routed from one LAN to the next. UTM cannot filter on what it cannot see, so your goal is not reachable. Web filtering can only filter on Source IP address, so even in a single-LAN environment, the solution would be to give the device a static IP address or a DHCP reservation. You need a different approach.,
I have encountered several fat-client applications that need to connect to a cloud-based service, and have trouble with web filtering based on AD SSO. Although some fat-client applications are wrappers around a web browser, and can take advantage of transparent AD SSO authentication, most are not. Without NTLM, the application's web actions appear to be unauthenticated.
#1 The best solution is for the application to support proxies. This involves prompting and probably storing a set of manually-entered credentials. When the application detects a 407 status code, it responds with the stored credentials. If you are building a commercial product, it is likely that some of your customers will have web proxies as well, so the application should be designed to cope with both standard-mode and transparent-mode proxy configurations. UTM is a great tool for testing those features.
#2 Website exception for the destination website(s). I am assuming that you have a finite number of web destinations that need to be accessed without authentication.
#3 Create a filter Action based on host name. Create a DNS Host object for each of the special PCs. Assign those host objects to the Allowed Networks list of a new Filter Profile, and configure the Filter Profile with Authentication=None. Then position the Filter Profile at the top of the list so that it always applies to those PCs. This approach is closest to your desired configuration, and it does not depend on a limited number of destination websites. You are still able to enforce normal UTM protections like Antivirus Scanning, Website Reputation, Category Filtering, and IPS/ATP filtering. If you configure Reverse DNS for each of your internal subnets, you can also get host names in the webfilter log file instead of source IP. That last step is not strictly required, because the webfilter log also contains the Filter Profile name and the authentication method code, both of which will tell you whether it is one of the special PCs or not.
In reply to DouglasFoster:
Thank you @DouglasFoster
That is very helpful.I will look into option 3.