This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to best configure Sophos UTM Home with Xfinity Gateway and Google Wifi?

Hello,

 

I have installed Sophos UTM Home v9.409-9 on a fanless PC behind an Xfinity Arris Modem/Gateway in DMZ mode and it's working well.  I do have a new problem though and am unsure how to best re-configure the UTM and/or the network.  I was previously using a Unifi AC Lite AP connected to a switch behind the UTM, but am now trying a Google Wifi (3 pack) mesh wireless network.  The problem is that the Google Wifi is a router and DHCP cannot be disabled so the hosts connected to the Google Wifi are triple NATed and therefore makes routing and inter-network communication challenging.  I've made do by creating a firewall rule from the IP address of the main Google Wifi unit --> ANY --> Internet IPv4 to allow my Nest thermostats to reach the internet, but would like to resolve the triple NAT fiasco while still letting the UTM inspect all traffic from hosts on any of my internal networks.  

The gateway used to be configured in Bridge mode, but it causes the UTM interface to lose connectivity often, which DMZ mode has resolved.  However, the gateway's DHCP server is enabled, the UTM also has DHCP server enabled and the Google Wifi has DHCP server enabled.  Cabling would be ideal, but isn't feasible due to the complexity of cabling through two stories of an existing home without ripping into too many walls.

 

Can anyone provide some advice on the best way to reconfigure the network or reconfigure the UTM to eliminate the triple NAT?  Ideally, I'd like to have both wired and wireless devices on the same subnet and traffic still filtered through the UTM so I'd have more control over the devices behind the UTM.  I also plan to add some IP security cameras connected to the ethernet jack on one of the Google Wifi Nodes but can't foresee how it's going to work with triple NAT.

Below is my current network diagram.  Thanks in advance for your advice and assistance.

 



This thread was automatically locked due to age.
Parents
  • OK this is finally working.  While sorting out some other things with tech support we got the Google wifi up and running and behind the XG85.  

    I should say that the primary google wifi unit was setup separately and had everything working.  (this eliminated confusion when plugging it into the Sophos.)    The next google wifi unit is meshing with the first one properly.   Then I plugged the primary one into the Sophos and DHCP assigned it an IP address.  I then had to go to Google wifi app and go into Settings>Network & General>Advanced networking>Wan and set it to DHCP.  The sophos then assigned it and IP address. and everything worked after that.    

    Later I took the Mac address and assigned it a static address under the Sophos XG DHCP.

    The trick was that we needed a DHCP range set up first in the XG and then to set up the Google wifi separately.  

    To make my Lan across both port 1 and 4 bridge port 1 and 4 (which may not be necessary in some instances.)  

    The Google wifi manages its own users and ip address assignments with static or dhcp.  It does not get management by the sophos wifi settings as It manages its own.  I am ok with that.  We have allot of phones etc and as long as they are all behind the firewall that is ok with me.   I do believe the sophos scans that traffic as it crosses the lan to the google wifi.      Also it manages its own meshing too which works fine.  No need to allow the sophos to interfere with the googles wifi specifics.     Google makes things easy to set up actually but has quite fast speeds and nice easy family friendly features.    Like the ability to turn off data to kids phones at bedtime and dinner.

    I would like to see some better screening of kid friendly things in the sophos too.    Odd but we have not found a way to screen out things like "pregnant barbie" videos on youtube.  All parents go :(.....  They get through most parental filters.   I want to control some game downloads and other exes that kids do as most kids machines are more virus prone than others.  The sophos is perfect for that.

    Needless to say we also run a home business that needs some decent protection.

    The printers need to be accessed all across the wifi.   So with the google wifi the Lan to Lan rule was necessary to make everything talk to one another. 

     

    Here is my map of the current set up.  It is working quite nicely.  I have backed up my Sophos setup in case I ever need to redeploy it.  Sorry this map took so long to provide.  This has been a work in progress and lots of progress has been made.

    As much as everyone says it can't work, Google WIFI does work with the Sophos, and I just proved it to myself.  Fast and secure all in one house.  ;)

  • Hi Dog,

    Glad you figured it out.  I'm still running with GWF haven't completely moved back to Unifi out of laziness and lack of time to troubleshoot. 

    For me, GWF still isn't an ideal solution because I'd like to be able to monitor and filter traffic per device or group of devices (e.g. kids have access to traffic through 80 and 443, monitor all other traffic include decrypting https, while allow an NVR, myself and other adults more customized access).  Once your devices are getting IPs from GWF, Sophos sees all only aggregate traffic from the GWF main node.  Aggregate traffic reports make it really difficult to track and troubleshoot problematic or compromised devices as well.

Reply
  • Hi Dog,

    Glad you figured it out.  I'm still running with GWF haven't completely moved back to Unifi out of laziness and lack of time to troubleshoot. 

    For me, GWF still isn't an ideal solution because I'd like to be able to monitor and filter traffic per device or group of devices (e.g. kids have access to traffic through 80 and 443, monitor all other traffic include decrypting https, while allow an NVR, myself and other adults more customized access).  Once your devices are getting IPs from GWF, Sophos sees all only aggregate traffic from the GWF main node.  Aggregate traffic reports make it really difficult to track and troubleshoot problematic or compromised devices as well.

Children
No Data