<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>WAF - VServer config problem</title><link>https://community.sophos.com/sophos-xg-firewall/f/discussions/147968/waf---vserver-config-problem</link><description>Hi! 
 Recently I want to configure a VIP with SSL termination on my Sophos Firewall 20 running as a VM. I have the SSL cert imported (+CA - there was no Let&amp;#39;s encrypt E5 CA so I added it). 
 I want to start from something really simple - Outside LAN to</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548584?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 18:32:56 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:804eb8df-f5aa-4db1-be96-cd8803905250</guid><dc:creator>Shadow82</dc:creator><description>&lt;p&gt;Problem solved. I&amp;#39;ve had &amp;quot;legacy&amp;quot; DNAT rule that has been hit when traffic was from Internet. User Lucar Toni has driven me into packet capture which showed me that hit was taking place.&lt;/p&gt;
&lt;p&gt;I totally forgot about it.&lt;/p&gt;
&lt;p&gt;After removing the rule, everything is working fine.&lt;/p&gt;
&lt;p&gt;Thanks for support!&lt;/p&gt;
&lt;p&gt;P.s.&lt;/p&gt;
&lt;p&gt;If I should mark this thread some more than &amp;quot;this is the answer&amp;quot;, tell me. I&amp;#39;ll do it&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548569?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 15:47:28 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:f465ffb3-f683-4ffd-b828-a35e20af34a4</guid><dc:creator>Shadow82</dc:creator><description>&lt;p&gt;I think I found it! Thanks for hint with WebGUI Packet capture, cause it gives you info which rules are in use.&lt;/p&gt;
&lt;p&gt;&lt;img src="/resized-image/__size/1280x960/__key/communityserver-discussions-components-files/126/pastedimage1731426298494v1.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;This put me back on track. I must say - I&amp;#39;m dumb, cause about 3 weeks before I tried to enable NextCloud AiO which had port 11000 as default listen port for it service.&lt;/p&gt;
&lt;p&gt;I forgot that I mangled initially - trying to do DNAT, which I failed and left the topic for some time.&lt;/p&gt;
&lt;p&gt;Recently I got back to it with more correct approach - WAF + Web server, but I haven&amp;#39;t clean up the old DNAT rules.&lt;/p&gt;
&lt;p&gt;After deleting NAT rule # 3 everything works fine!!! :)&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Thanks - I learned something about Sophos FW TShoot - with drppkt &amp;amp; webgui tcpdump :)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548566?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 15:18:34 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:36b57939-c5e0-4cb6-ae00-99347226ca35</guid><dc:creator>Shadow82</dc:creator><description>&lt;p&gt;I will. I can add for the moment, that this is quite fresh install with just few FW rules accepting Chrome Remote Desktop, FTP, SMB for the server we speak about.&lt;/p&gt;
&lt;p&gt;No any fancy stuff there (yet) :)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548565?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 15:10:59 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:21bab76a-e9f2-469f-b24d-07644f1fab6a</guid><dc:creator>LuCar Toni</dc:creator><description>&lt;p&gt;If drppkt is not dropping / logging, this is an indicator, that something else is accepting this.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Double check: Ports used for SSLVPN, VPN Portal, User Portal in Webadmin.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548563?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 15:05:19 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:4e36a4e7-b0cd-4207-8f84-4da9c1c9abf0</guid><dc:creator>Shadow82</dc:creator><description>&lt;p&gt;Thanks for hints.&amp;nbsp;&lt;br /&gt;Now I see that&amp;nbsp;requests from LAN are ok. but requests from Internet are being dropped on FW and this is observed with tcpdump only. I don&amp;#39;t see any rule hit, log entries and I need a bit more time with drppkt - but as for now I tried to grep with TCP or 443 and nothing is being returned when I request from Internet.&lt;/p&gt;
&lt;p&gt;Only TCPDump TCP RST after the handshake is done&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548562?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 14:54:48 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:f5587747-0028-488b-8487-e7028ba95054</guid><dc:creator>LuCar Toni</dc:creator><description>&lt;p&gt;Community is very senstive setup due the attacks and phishing attemps. Try to avoid URLs in that form.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548559?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 14:22:18 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:84f62542-0d28-4813-ae0a-2ceb49935797</guid><dc:creator>Shadow82</dc:creator><description>&lt;p&gt;thats my type&amp;#39;o. sorry for that.&lt;/p&gt;
&lt;p&gt;real server use &lt;a href="https://nextcloud.home:8081"&gt;https://nextcloud.home:8081&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I corrected it and my post has been marked as abusive. I appealed. Admins said - ok. and the post came back uncorrected.&lt;br /&gt;So I corrected it again. The post was marked as abusive. I appealed. Admins said - ok. and the post came back uncorrected.&lt;/p&gt;
&lt;p&gt;... :-)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548543?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 10:51:21 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:23099924-a1cf-4d62-a4c0-03fb76bdba66</guid><dc:creator>LuCar Toni</dc:creator><description>&lt;p&gt;Maybe you should filter with a Pipe.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;drppkt | grep 443&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548541?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 10:33:25 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:9a0dad56-aef7-4637-9eb4-4599aa0067d0</guid><dc:creator>LuCar Toni</dc:creator><description>&lt;p&gt;Try the drop packet capture on the firewall console.&lt;/p&gt;
&lt;p&gt;drppkt is the command.&lt;/p&gt;
&lt;p&gt;And check the packet capture on the webadmin for the same, if you see consumed traffic.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548540?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 10:25:21 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ed0382d5-24ea-4791-a5b5-7ec43dcdc211</guid><dc:creator>LuCar Toni</dc:creator><description>&lt;p&gt;You said, the real server is using HTTPS, so you should select HTTPS as the real server as well.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Do you have any kind of reverseproxy.log entries? This is the first step to check, if the WAF is actually used or something else blocked it.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548537?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 10:19:55 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:f88e8de3-95d3-4774-80d3-ae537ad5a5fd</guid><dc:creator>Shadow82</dc:creator><description>&lt;p&gt;There are none logs when I try to connect from Internet. Only TCP RST from FW.&lt;/p&gt;
&lt;p&gt;Fun fact - if I connect from my LAN to the url (LAN has DNS entry for &lt;a id="" href="https://drive.acme.com"&gt;https://drive.acme.com&lt;/a&gt;&amp;nbsp;==&amp;gt; 192.168.1.10). From LAN it works, so we might say the WAF rules config on FW is ok. but the traffic coming from Internet is being dropped and I don&amp;#39;t know why&lt;/p&gt;
&lt;p&gt;Request from LAN to &lt;a id="" href="https://drive.acme.com"&gt;https://drive.acme.com&lt;/a&gt;&amp;nbsp;- ok.&lt;/p&gt;
&lt;p&gt;SFVH_VM01_SFOS 20.0.2 MR-2-Build378# tcpdump host 192.168.1.69 and port 443 -nn&lt;br /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;br /&gt;listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes&lt;br /&gt;11:19:38.190468 PortB, IN: IP 192.168.1.69.26962 &amp;gt; 192.168.1.10.443: Flags [F.], seq 580342173, ack 3022210096, win 2053, length 0&lt;br /&gt;11:19:38.190505 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26962: Flags [.], ack 1, win 411, length 0&lt;br /&gt;11:19:38.190515 PortB, IN: IP 192.168.1.69.26962 &amp;gt; 192.168.1.10.443: Flags [R.], seq 1, ack 1, win 0, length 0&lt;br /&gt;11:19:38.190519 PortB, IN: IP 192.168.1.69.26963 &amp;gt; 192.168.1.10.443: Flags [F.], seq 3367240768, ack 916219605, win 1022, length 0&lt;br /&gt;11:19:38.190527 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26963: Flags [.], ack 1, win 434, length 0&lt;br /&gt;11:19:38.190531 PortB, IN: IP 192.168.1.69.26963 &amp;gt; 192.168.1.10.443: Flags [R.], seq 1, ack 1, win 0, length 0&lt;br /&gt;11:19:38.190696 PortB, IN: IP 192.168.1.69.26961 &amp;gt; 192.168.1.10.443: Flags [F.], seq 425507548, ack 4175423194, win 1026, length 0&lt;br /&gt;11:19:38.190697 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [S], seq 153100110, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;br /&gt;11:19:38.190707 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26961: Flags [.], ack 1, win 616, length 0&lt;br /&gt;11:19:38.190712 PortB, IN: IP 192.168.1.69.26961 &amp;gt; 192.168.1.10.443: Flags [R.], seq 1, ack 1, win 0, length 0&lt;br /&gt;11:19:38.190734 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [S.], seq 816268867, ack 153100111, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0&lt;br /&gt;11:19:38.190986 PortB, IN: IP 192.168.1.69.26993 &amp;gt; 192.168.1.10.443: Flags [S], seq 545524837, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;br /&gt;11:19:38.191004 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26993: Flags [S.], seq 979956694, ack 545524838, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0&lt;br /&gt;11:19:38.191580 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [.], ack 1, win 1026, length 0&lt;br /&gt;11:19:38.191836 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [.], seq 1:1461, ack 1, win 1026, length 1460&lt;br /&gt;11:19:38.191844 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], ack 1461, win 251, length 0&lt;br /&gt;11:19:38.191851 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [P.], seq 1461:1825, ack 1, win 1026, length 364&lt;br /&gt;11:19:38.191853 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], ack 1825, win 274, length 0&lt;br /&gt;11:19:38.192089 PortB, IN: IP 192.168.1.69.26993 &amp;gt; 192.168.1.10.443: Flags [.], ack 1, win 1026, length 0&lt;br /&gt;11:19:38.192177 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [P.], seq 1:157, ack 1825, win 274, length 156&lt;br /&gt;11:19:38.192356 PortB, IN: IP 192.168.1.69.26993 &amp;gt; 192.168.1.10.443: Flags [.], seq 1:1461, ack 1, win 1026, length 1460&lt;br /&gt;11:19:38.192361 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26993: Flags [.], ack 1461, win 251, length 0&lt;br /&gt;11:19:38.192369 PortB, IN: IP 192.168.1.69.26993 &amp;gt; 192.168.1.10.443: Flags [P.], seq 1461:1761, ack 1, win 1026, length 300&lt;br /&gt;11:19:38.192370 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26993: Flags [.], ack 1761, win 274, length 0&lt;br /&gt;11:19:38.192490 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26993: Flags [P.], seq 1:157, ack 1761, win 274, length 156&lt;br /&gt;11:19:38.193137 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [P.], seq 1825:1876, ack 157, win 1025, length 51&lt;br /&gt;11:19:38.193142 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [P.], seq 1876:2979, ack 157, win 1025, length 1103&lt;br /&gt;11:19:38.193150 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], ack 2979, win 297, length 0&lt;br /&gt;11:19:38.193400 PortB, IN: IP 192.168.1.69.26993 &amp;gt; 192.168.1.10.443: Flags [P.], seq 1761:1812, ack 157, win 1025, length 51&lt;br /&gt;11:19:38.231266 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 157:1617, ack 2979, win 297, length 1460&lt;br /&gt;11:19:38.231279 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 1617:3077, ack 2979, win 297, length 1460&lt;br /&gt;11:19:38.231285 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 3077:4537, ack 2979, win 297, length 1460&lt;br /&gt;11:19:38.231290 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 4537:5997, ack 2979, win 297, length 1460&lt;br /&gt;11:19:38.231295 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 5997:7457, ack 2979, win 297, length 1460&lt;br /&gt;11:19:38.231300 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [P.], seq 7457:8378, ack 2979, win 297, length 921&lt;br /&gt;11:19:38.231328 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [P.], seq 8378:8850, ack 2979, win 297, length 472&lt;br /&gt;11:19:38.232527 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [.], ack 8850, win 1026, length 0&lt;br /&gt;11:19:38.239746 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26993: Flags [.], ack 1812, win 274, length 0&lt;br /&gt;11:19:40.963822 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [P.], seq 2979:3933, ack 8850, win 8195, length 954&lt;br /&gt;11:19:40.984071 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 8850:10310, ack 3933, win 320, length 1460&lt;br /&gt;11:19:40.984095 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 10310:11770, ack 3933, win 320, length 1460&lt;br /&gt;11:19:40.984103 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 11770:13230, ack 3933, win 320, length 1460&lt;br /&gt;11:19:40.984108 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [.], seq 13230:14690, ack 3933, win 320, length 1460&lt;br /&gt;11:19:40.984114 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 192.168.1.69.26992: Flags [P.], seq 14690:15374, ack 3933, win 320, length 684&lt;br /&gt;11:19:40.985355 PortB, IN: IP 192.168.1.69.26992 &amp;gt; 192.168.1.10.443: Flags [.], ack 15374, win 8195, length 0&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Request from Internet to &lt;a id="" href="https://drive.acme.com"&gt;https://drive.acme.com&lt;/a&gt;&amp;nbsp;- RST&lt;/p&gt;
&lt;p&gt;11:17:33.994862 PortB, IN: IP 31.61.248.85.24739 &amp;gt; 192.168.1.10.443: Flags [S], seq 76282307, win 65535, options [mss 1220,nop,wscale 4,sackOK,TS val 534791239 ecr 0], length 0&lt;br /&gt;11:17:33.996043 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 31.61.248.85.24739: Flags [R.], seq 0, ack 76282308, win 0, length 0&lt;br /&gt;11:17:34.034853 PortB, IN: IP 31.61.248.85.1213 &amp;gt; 192.168.1.10.443: Flags [S], seq 2687500049, win 65535, options [mss 1220,nop,wscale 4,sackOK,TS val 534791278 ecr 0], length 0&lt;br /&gt;11:17:34.035632 PortB, OUT: IP 192.168.1.10.443 &amp;gt; 31.61.248.85.1213: Flags [R.], seq 0, ack 2687500050, win 0, length 0&lt;/p&gt;
&lt;p&gt;Port forwarding looks good but FW drops if it sees request from pbulic IP (?)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: WAF - VServer config problem</title><link>https://community.sophos.com/thread/548535?ContentTypeID=1</link><pubDate>Tue, 12 Nov 2024 09:19:59 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:04245d7e-3b55-4b6d-a890-7ae2d2ca670d</guid><dc:creator>FFin</dc:creator><description>&lt;p&gt;When you can access your server internally via&amp;nbsp;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://nextcloud.home:8081/"&gt;https://nextcloud.home:8081&lt;/a&gt;&amp;nbsp;you should go from Type &amp;quot;Plaintext (HHTP)&amp;quot; to HTTPS for Real Webserver Settings in Waf.&lt;br /&gt;And add to your NextCloud config.php on Webserver:&lt;br /&gt;&lt;span&gt;&amp;#39;trusted_proxies&amp;#39;&lt;/span&gt;&lt;span&gt;&amp;gt;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;[&lt;/span&gt;&lt;span&gt;&amp;#39;internal IP of Sophos here&amp;#39;&lt;/span&gt;&lt;span&gt;]&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>