This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to best configure Sophos UTM Home with Xfinity Gateway and Google Wifi?

Hello,

 

I have installed Sophos UTM Home v9.409-9 on a fanless PC behind an Xfinity Arris Modem/Gateway in DMZ mode and it's working well.  I do have a new problem though and am unsure how to best re-configure the UTM and/or the network.  I was previously using a Unifi AC Lite AP connected to a switch behind the UTM, but am now trying a Google Wifi (3 pack) mesh wireless network.  The problem is that the Google Wifi is a router and DHCP cannot be disabled so the hosts connected to the Google Wifi are triple NATed and therefore makes routing and inter-network communication challenging.  I've made do by creating a firewall rule from the IP address of the main Google Wifi unit --> ANY --> Internet IPv4 to allow my Nest thermostats to reach the internet, but would like to resolve the triple NAT fiasco while still letting the UTM inspect all traffic from hosts on any of my internal networks.  

The gateway used to be configured in Bridge mode, but it causes the UTM interface to lose connectivity often, which DMZ mode has resolved.  However, the gateway's DHCP server is enabled, the UTM also has DHCP server enabled and the Google Wifi has DHCP server enabled.  Cabling would be ideal, but isn't feasible due to the complexity of cabling through two stories of an existing home without ripping into too many walls.

 

Can anyone provide some advice on the best way to reconfigure the network or reconfigure the UTM to eliminate the triple NAT?  Ideally, I'd like to have both wired and wireless devices on the same subnet and traffic still filtered through the UTM so I'd have more control over the devices behind the UTM.  I also plan to add some IP security cameras connected to the ethernet jack on one of the Google Wifi Nodes but can't foresee how it's going to work with triple NAT.

Below is my current network diagram.  Thanks in advance for your advice and assistance.

 



This thread was automatically locked due to age.
Parents
  • I'm glad you told us that the Google WiFi can't function as a bridge and must do its own DHCP and masquerading - that seems unusual to me.  My suggestion would be to replace those with Sophos AP 15s in mesh.  I would also try to get a different solution than the Xfinity - it sounds like it's got many of the same problems as the Residential Gateway AT&T provides.

    I know you're probably stuck with those things, so I apologize for raining on your parade.  Here's the best I can see at present:

    • Add a NIC for connection to the Google WiFi device and bridge that to the External interface so there's only a double NAT for your wireless devices.  You might want to create a new Web Filtering Profile.
    • Leave the current "Internal (Network)" as is.  You will need firewall rules to allow any desired traffic between the wired devices and the wireless ones.

    Any better luck with that?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi Bob,

    Thanks for your advice.  The second option sounds the most feasible.  For the firewall rules, would I just create a rule that allows traffic from the IP assigned by the UTM to the primary Google Wifi (GWF) to the wired network/devices?  

    Is there a way to configure the UTM to act as a bridge but still route and inspect traffic without assigning IP addresses to attached devices (i.e. between the Xfinity gateway device and the primary GWF)?  This way I could possibly try to set the Xfinity gateway back in Bridge/IP Passthrough mode to the UTM, then add a switch to one or more of the ports on a GWF node to connect my wired devices to to be on same subnet in a single NAT scenario with the GWF the only device doing DHCP.

    The first option might be doable, but would require using a USB ethernet dongle since I'm running Sophos on a Zotac CI323 that has two built in Realtek ethernet interfaces only.  Seems that using a USB ethernet dongle isn't that reliable?

     

     

  • "The first option might be doable, but would require using a USB ethernet dongle since I'm running Sophos on a Zotac CI323 that has two built in Realtek ethernet interfaces only."

    The two points work together.  It sounds like it's either a new device for the UTM, putting up with a triple NAT or bridging Internal and External.

    "For the firewall rules, would I just create a rule that allows traffic from the IP assigned by the UTM to the primary Google Wifi (GWF) to the wired network/devices?"

    Yes.  If you only have two NICs, the rule won't be necessary.  In any case, as the Google WiFi is masquerading, you won't have access from the wired network to the wireless devices.

    "Is there a way to configure the UTM to act as a bridge but still route and inspect traffic without assigning IP addresses to attached devices"

    Yes, it should do that.  This is where I would add a Web Filtering Profile in Full Transparent mode for the Google WiFi IP.  If bridging internal and external, just change the current profile to Full Transparent and change 'Allowed Networks' to just include the subnet assigned by the Xfinity.

    Are you certain that Google WiFi can't be put into bridge mode?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Thanks.  I'll try to place the UTM in Bridge mode later when I have local access to it.  

     

    Technically the Google Wifi primary unit can be placed in Bridge mode, but it will disable all the mesh features and reduce the primary unit to a standard AP.  

    https://support.google.com/wifi/answer/6240987?hl=en

    Does Google Wifi support Bridge mode?

    Yeah, but it will only work if you’re using a single Google Wifi point or OnHub. If you’re creating a mesh network with multiple Wifi points, your Primary Wifi point cannot be in Bridge mode. This is because the Primary Wifi point needs to do special things to control settings and communication within your Wi-Fi network. If it’s in bridge mode, you’ll lose some of Google Wifi’s key features.

  • I've been trying to setup an Ethernet Bridge here and there over the past two days but can't get it working.  Does my host need to have 3 NICs to configure a bridge?  Is there any documentation on how to configure a transparent bridge in v9.4?

  • You don't need a third NIC, but you can't bridge using a NIC that's already in use in an Interface definition.  It will probably be easier to make notes about where the objects associated to your External interface are used in your configuration, delete that interface and then add that NIC to your Internal interface by changing its type to "Ethernet bridge."

    Once you've bridged, if you're using Transparent mode in Web Filtering, be sure to change that to "Full Transparent."

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • I've done as you instructed and deleted the WAN interface then changed the LAN interface to Ethernet Bridge, added the former WAN interface, changed Web Filtering to Full Transparent mode and after some changes it's working but the UTM is no longer filtering packets.  My test website "www.penthouse.com" loads without interruption.

     

    Additional changes on UTM, not sure if they are correct but it seems to work:

    1. IP address of BR0 is 192.168.1.254 (same IP as before bridging) and set IPv4 Gateway to gateway of Xfinity modem (10.0.0.1) - removed latter settings, didn't have an effect
    2. Created a new firewall rule for ANY-ANY-ANY-ALLOW
    3. Disabled DHCP server in Network Services on 192.168.1.254

    Since I'm now getting an IP address from the Google Wifi and not from the UTM, how do I log back into the UTM to manage settings?  I know I can do it by taking the cable out of the Google Wifi and plug it into a computer or use the existing USB NIC for a management interface, but is there a way to add a route or other setting so I can still configure the UTM as needed without the additional USB and/or swapping cables?  What setting is needed to restore the Web Filtering?

Reply
  • I've done as you instructed and deleted the WAN interface then changed the LAN interface to Ethernet Bridge, added the former WAN interface, changed Web Filtering to Full Transparent mode and after some changes it's working but the UTM is no longer filtering packets.  My test website "www.penthouse.com" loads without interruption.

     

    Additional changes on UTM, not sure if they are correct but it seems to work:

    1. IP address of BR0 is 192.168.1.254 (same IP as before bridging) and set IPv4 Gateway to gateway of Xfinity modem (10.0.0.1) - removed latter settings, didn't have an effect
    2. Created a new firewall rule for ANY-ANY-ANY-ALLOW
    3. Disabled DHCP server in Network Services on 192.168.1.254

    Since I'm now getting an IP address from the Google Wifi and not from the UTM, how do I log back into the UTM to manage settings?  I know I can do it by taking the cable out of the Google Wifi and plug it into a computer or use the existing USB NIC for a management interface, but is there a way to add a route or other setting so I can still configure the UTM as needed without the additional USB and/or swapping cables?  What setting is needed to restore the Web Filtering?

Children
    1. Change the bridged Interface to have an IP in the subnet assigned by the Xfinity modem.  The Google should be communicating with the UTM in that subnet.
    2. That's right.
    3. That's right - no DHCP done by the UTM.

    Once you've got a reachable IP on the UTM, you should be able to look at the Web Filtering Live Log to see if your accesses are going out via the Proxy.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Applied #1 and am able to manage the UTM from a host behind the Google Wifi

    Web Filtering is working now after a reboot of the UTM.  Had a brief DNS issue which caused all URLs to be unable to be resolved but I applied most of your "DNS Best practices" and after reboot and some waiting, the issue cleared up.  Also had an issue with Team Viewer inbound failing to connect, but that seems to have cleared itself up and disabling/re-enabling web filtering. 

     

    So I think that's it. It's all working.   

     

    Thank you for your help!!!!

  • I might be posting this in the wrong area but It is the only thread I can find about the Google Wifi and Sophos product.  

    I have a Sophos XG85 and 3 pack of Google wifi.  

     

    I would really like to use them and have found that there is no easy installation of this firewall.

     

    Can some one break this triple NAT down in steps or even explain why DMZ is needed? and how to use that.  

    I cannot find anyone describing how to set up a Triple Nat in google searches.

     

    This would help me greatly.

     

    Thanks Rick M

  • Hi Rick - you're right, you will want to post your XG question in the XG Community - this is the UTM Community.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Unknown said:

    I might be posting this in the wrong area but It is the only thread I can find about the Google Wifi and Sophos product.  

    I have a Sophos XG85 and 3 pack of Google wifi.  

    I would really like to use them and have found that there is no easy installation of this firewall.

    Can some one break this triple NAT down in steps or even explain why DMZ is needed? and how to use that.  

    I cannot find anyone describing how to set up a Triple Nat in google searches.

    This would help me greatly.

    Thanks Rick M

    Rick,

    The answer to your question is in my reply to Herman just above this one or in BAlfson's discussion with Herman higher up.  If you only need two networks internal and Guest Wi-Fi, the choice on who to follow is up to you.  If you need more than 2 networks, you'll have to go with the more thorough option.

    Your issue is the same as Herman's as there is no difference between in having a Sophos SG UTM or a Sophos XG Firewall in this predicament.

  • Both the UTM and the XG are so similar that I don't see a difference.  It helps both sections.

    What I need to know is if google WiFi is working on the DMZ or on another port.

     

    I have it connected straight into port4 and have it as WIFI . (not the DMZ)

    DHCP seems to get it further than any other setting in the google WiFi system.

     

    If it will only work in DMZ then I need to know that.    It is one piece of a complex puzzle.

     

  • ADogNamedGromet said:

    Both the UTM and the XG are so similar that I don't see a difference.  It helps both sections.

    What I need to know is if google WiFi is working on the DMZ or on another port.

    I have it connected straight into port4 and have it as WIFI . (not the DMZ)

    DHCP seems to get it further than any other setting in the google WiFi system.

    If it will only work in DMZ then I need to know that.    It is one piece of a complex puzzle.

    Rick,

    Yes, for your needs, the SG UTM and the XG Firewall are very similar.  The problem here is not the Sophos product you choose.

    The problem is the Wi-Fi system.  Google WiFi/OnHub and other similar Wi-Fi systems (Netgear Orbi, Linksys Velop, TP-Link Deco, Eero Pro) have their own gateway/router that causes conflicts behind security systems.  These all-in-one Wi-Fi systems are designed to replace your Firewall/UTM and be their own independent network.  This is what makes them a problem and makes the problem complicated.

    If you decide to keep your Google Wi-Fi, there is no easy answer.  There will always be a catch with these types of Wi-Fi systems.  You could solve this problem by connecting your Google WiFi to the DMZ, so it can act independently.  But then, this would put your our Google WiFi devices would be on their own independent network with their own internet connection.  What would be the point of your UTM/Firewall then? 

    The easy and proper way to do this is to use standard Wi-Fi system that simply connects your wireless LAN to your wired LAN with no issue in between, like the Sophos Secure Wireless Add-On for both the SG UTM and XG Firewall.  For the same price as Google Wi-Fi, you could get an affordable enterprise Wi-Fi system like Ubiquiti UniFi.  To replicate your Google WiFi system, you need 3 UniFi UAP-AC-LITE with 1 UniFi Cloud Key (if you don't have a computer that operates 24/7).  If you need a little more range or want to put APs outside, get UniFi UAP-AC-PRO APs instead.  Both Sophos and Ubiquiti wireless systems would allow you to customize your Wi-Fi and provide more capability such as having more than 2 SSIDs and connecting them to whatever LAN/VLAN you want.