There are four possible configurations for UTM:
- UTM is the perimeter firewall, supporting all features
- UTM is immediately behind the perimeter firewall on a bridged connection, supporting all features
- UTM is immediately behind the perimeter firewall on a routed connection, supporting all features
- UTM is out-of-band (anywhere else on the intranet), supporting only Standard Proxy and Internal features
Bridged and Routed connections should be functionally identical. However, inserting UTM into the network using a bridged connection should require no changes to the firewall or the internal router, while inserting UTM into an existing network using a routed connection will require addressing and routing changes on one of the adjacent devices. So option 3 can be ignored.
I don't want to use UTM as my firewall, and option 4 doe snot support all features, so bridged mode has the most appeal. On a UTM bridge, the system administrator must specify all of the ethertypes that are supposed to be passed, and I don't know how to determine which ones will be needed. I did find an RFC with all of them listed, but it is a long list and UTM requites them to be entered one at a time.
My one brief attempt to use a bridged configuration failed miserably, mostly because I could not figure out how to debug problems, and I did not have the luxury of waiting while a support case percolated through Sophos. The test was at least a year ago, so I don't remember many details, other than that Internet traffic was not flowing properly. My unused bridge configuration is still preserved in UTM:
- Ethertypes passed: 8887, 0806, 814c, 8035, 876b
- Allow arp broadcasts: Yes
- Allow IPV6: No (not required)
- Spanning tree: Off
- Aging timeout: 30 seconds (default)
- Virtual MAC addresss: default (lowest of member MAC addresses)
Has anyone made bridged mode work? What settings did you use? If you tried and failed, do you know why it failed for you?
This thread was automatically locked due to age.