<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>The infamous fwrule=&amp;quot;60001&amp;quot;</title><link>https://community.sophos.com/utm-firewall/f/general-discussion/104973/the-infamous-fwrule-60001</link><description>Just performed a new installation of UTM 9. created network and service definition however access to this resource is being blocked. The firewall is logging the following. 
 2018:08:31-00:15:27 firewall ulogd[1111]: id=&amp;quot;2001&amp;quot; severity=&amp;quot;info&amp;quot; sys=&amp;quot;SecureNet</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: The infamous fwrule="60001"</title><link>https://community.sophos.com/thread/382781?ContentTypeID=1</link><pubDate>Mon, 03 Sep 2018 10:27:17 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:18258fdd-b5c6-4647-8140-40ae35a6bb6b</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Hi Paul and welcome to the UTM Community!&lt;/p&gt;
&lt;p&gt;Instead of looking elsewhere to get good advice, start in this community.&amp;nbsp; If there&amp;#39;s a better explanation of something elsewhere, you will find links here.&amp;nbsp; In this case, not only is Richards&amp;#39; piece painfully long, it&amp;#39;s wrong.&lt;/p&gt;
&lt;p&gt;In the DNAT definition itself, you can use the green &lt;span style="color:#00ff00;font-size:150%;"&gt;&lt;strong&gt;&lt;span style="font-size:x-large;"&gt;+&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt; icon to define any new item needed - no need to traipse all around WebAdmin.&lt;/p&gt;
&lt;p&gt;See #5 in &lt;a href="/products/unified-threat-management/f/general-discussion/22065/rulz"&gt;Rulz&lt;/a&gt;&amp;nbsp;to understand that Richards himself was new to UTM when he created that piece.&lt;/p&gt;
&lt;p&gt;Finally - the error causing your packets to be tossed overboard by the firewall...&amp;nbsp; Your RDP definition is incorrect - the Source Port should be 1:65535, not 5000.&amp;nbsp; The packet in your firewall log line didn&amp;#39;t qualify because its source port was 47439.&amp;nbsp; The standard RDP definition should have been used in a NAT rule like:&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;Internet -&amp;gt; {1:65535-&amp;gt;1243} -&amp;gt; External (Address) : to {network service host} using RDP&lt;/p&gt;
&lt;p&gt;In any case, I think the advice to use remote access is spot on.&amp;nbsp; If you will have more than one person at a time using RDP remotely, I would use the SSL VPN.&amp;nbsp; If it will never be more than one, the HTML5 method might be more to your liking.&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: The infamous fwrule="60001"</title><link>https://community.sophos.com/thread/382653?ContentTypeID=1</link><pubDate>Fri, 31 Aug 2018 18:56:22 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:76c69232-524c-4c3a-a923-8daa7688cc19</guid><dc:creator>DouglasFoster</dc:creator><description>&lt;p&gt;Read thus discussion snnd KB article.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://community.sophos.com/products/unified-threat-management/f/network-protection-firewall-nat-qos-ips/104859/latest-kbs-sophos-utm-how-to-avoid-rdp-brute-force-attacks"&gt;community.sophos.com/.../latest-kbs-sophos-utm-how-to-avoid-rdp-brute-force-attacks&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;port substitution may.help, but tbere are absolutely a lot of bad guys doing password guessong attacks on RDP.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: The infamous fwrule="60001"</title><link>https://community.sophos.com/thread/382644?ContentTypeID=1</link><pubDate>Fri, 31 Aug 2018 17:16:51 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:75aaa572-6fc2-4cb0-8d1e-0815feb40f79</guid><dc:creator>apijnappels</dc:creator><description>&lt;p&gt;Are you sure you would like to have a RDP session open on the internet for everyone to (ab)use?&lt;/p&gt;
&lt;p&gt;Also in step 3 it is recommended to set the interface to internal, while that will work, it might give you a lot of headache later on. It&amp;#39;s best to leave the interface blank as default.&lt;/p&gt;
&lt;p&gt;It is NOT RECOMMENDED to NAT to an RDP server from the internet, period! It&amp;#39;s just not safe enough when you let everyone in the entire world connect to your RDP machine. Using a different port won&amp;#39;t add much security (security&amp;nbsp;through obscurity).&lt;/p&gt;
&lt;p&gt;If you do need to RDP session then make the extra step and secure it behind a VPN or at the very least restrict the source IP&amp;#39;s that are allowed to connect (but prefer the VPN).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: The infamous fwrule="60001"</title><link>https://community.sophos.com/thread/382612?ContentTypeID=1</link><pubDate>Fri, 31 Aug 2018 07:50:14 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:16ec2afc-4b0e-499a-af3d-7db3e15feeb9</guid><dc:creator>Paul Dennis</dc:creator><description>&lt;p&gt;Typo on the port number..&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The steps I when through is outline here -&amp;nbsp;&lt;a href="https://fortwayneits.zendesk.com/hc/en-us/articles/235945188-How-to-do-Port-Forward-Translation-for-RDP-in-a-Sophos-UTM-9"&gt;https://fortwayneits.zendesk.com/hc/en-us/articles/235945188-How-to-do-Port-Forward-Translation-for-RDP-in-a-Sophos-UTM-9&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Copied from the link. In a default installation should this work. My goal is have a RDP session incoming on port 1223 and connecting on the internal host on port 3389.&lt;/p&gt;

&lt;h1&gt;How to do Port Forward Translation for RDP in a Sophos UTM 9&lt;/h1&gt;
&lt;div class="article-info"&gt;
&lt;div class="article-avatar"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="article-meta"&gt;&lt;strong class="article-author" title="Rees Richards"&gt;Rees Richards&lt;/strong&gt;
&lt;div class="article-updated meta"&gt;&lt;time title="2018-08-10 02:20" datetime="2018-08-10T06:20:59Z"&gt;August 10, 2018 02:20&lt;/time&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;a class="article-subscribe" title="Opens a sign-in dialog" href="https://fortwayneits.zendesk.com/hc/en-us/articles/235945188-How-to-do-Port-Forward-Translation-for-RDP-in-a-Sophos-UTM-9/subscription" rel="nofollow"&gt;Follow&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="content-body article-body"&gt;
&lt;p&gt;&lt;strong&gt;Step 1:&amp;nbsp;&lt;/strong&gt;Log into your SOPHOS UTM 9 appliance and go to &amp;quot;Definitions &amp;amp; Users&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481487v2.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481487v2.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2:&lt;/strong&gt;&amp;nbsp;Click on &amp;quot;Network Definitions&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v3.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v3.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 3:&amp;nbsp;&lt;/strong&gt;Click &amp;quot;New Network Definition...&amp;quot; and create a &amp;quot;Host&amp;quot; for the computer you would like to Remote into by it&amp;#39;s IP Address.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;NOTE:&amp;nbsp;&lt;/strong&gt;Ensure that the &amp;quot;interface&amp;quot; is set to Internal&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v4.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v4.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 4:&amp;nbsp;&lt;/strong&gt;Click on &amp;quot;Service Definitions&amp;quot; and add a &amp;quot;New Service Definition...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v5.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v5.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 5:&amp;nbsp;&lt;/strong&gt;Here is where you specify the&amp;nbsp;&lt;strong&gt;&lt;span class="wysiwyg-color-orange"&gt;external&lt;/span&gt;&lt;/strong&gt;&amp;nbsp;Port for your connection&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v6.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v6.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 6:&amp;nbsp;&lt;/strong&gt;Here is where you specify the&amp;nbsp;&lt;strong&gt;&lt;span class="wysiwyg-color-orange"&gt;internal&lt;/span&gt;&lt;/strong&gt;&amp;nbsp;Port of your connection (Port 3389 is the standard for Microsoft RDP)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;NOTE:&amp;nbsp;&lt;/strong&gt;Your source Port needs to be the same as the Destination Port of Step 5&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v7.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481488v7.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 7:&amp;nbsp;&lt;/strong&gt;Here is where you&amp;#39;ll go to create the actual firewall rule. Go to &amp;quot;Network Protection&amp;quot; and click &amp;quot;NAT&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481489v8.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481489v8.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 8:&amp;nbsp;&lt;/strong&gt;Select &amp;quot;NAT&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481489v9.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481489v9.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 9:&amp;nbsp;&lt;/strong&gt;Click add &amp;quot;New NAT Rule...&amp;quot; at the top&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span class="wysiwyg-color-blue"&gt;Using service:&lt;/span&gt;&amp;nbsp;&lt;/strong&gt;This is the first service rule you created in &amp;quot;Step 5&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span class="wysiwyg-color-green110"&gt;Change the destination to:&lt;/span&gt;&amp;nbsp;&lt;/strong&gt;This is the host you created in &amp;quot;Step 3&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;span class="wysiwyg-color-orange"&gt;&lt;strong&gt;And the service to:&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;This is the second service rule you created in &amp;quot;Step 6&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span class="wysiwyg-color-purple"&gt;Automatic firewall rule:&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;This automatically creates a firewall rule to allow your RDP connection through&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-discussions-components-files/51/pastedimage1535718481489v10.jpeg"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-discussions-components-files/51/pastedimage1535718481489v10.jpeg" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class="article-attachments"&gt;&amp;nbsp;&lt;/div&gt;

&lt;div class="article-vote"&gt;&amp;nbsp;&lt;/div&gt;

&lt;aside class="article-sidebar side-column"&gt;

&lt;/aside&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: The infamous fwrule="60001"</title><link>https://community.sophos.com/thread/382582?ContentTypeID=1</link><pubDate>Fri, 31 Aug 2018 02:39:41 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:e7e704c0-9f23-452f-98dd-be3846b69035</guid><dc:creator>DKKDG</dc:creator><description>&lt;p&gt;Hi Paul,&lt;/p&gt;
&lt;p&gt;what is the goal you want to accomplish?&lt;/p&gt;
&lt;p&gt;For sure you have to create firewall rules for any communication you want to allow.&lt;br /&gt;All what is not defined ist blocked by default.&lt;/p&gt;
&lt;p&gt;The log strip you put in here show a connection to port 4444.&lt;br /&gt;This is the default webadmin port f&amp;uuml;r any interface.&lt;br /&gt;Try another port for your network service host. By the way did you created a DNAT rule.&lt;/p&gt;
&lt;p&gt;Or try to check the &lt;a href="/products/unified-threat-management/f/general-discussion/22065/rulz"&gt;Rulz&lt;/a&gt; No.3 by Bob&lt;/p&gt;
&lt;p&gt;Best Regards&lt;br /&gt;DKKDG&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>