Hi,
have trouble to access the User Protal via WAF.
Regardless of the definition of allowed networks, any access is blocked by this FW rule: "2 LOGDROP tcp -- !127.0.0.0/8 0.0.0.0/0 tcp spts:1:65535 dpt:2048 LOGMARK match 60005". It did not help, to NAT the connection via a internal IP nor to create a rule to allow the access. Why is an WebAdmin blocking rule build for the User Portal (according to the doc, 60005 is webadmin).
Thanks
Henri
2020:12:16-20:23:17 utm-1 ulogd[7924]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62001" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.201.88" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38230" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:17 utm-1 ulogd[7924]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60005" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.205.89" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38230" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:18 utm-1 ulogd[7924]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62001" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.201.88" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38230" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:18 utm-1 ulogd[7924]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60005" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.205.89" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38230" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:18 utm-1 ulogd[7924]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62001" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.201.88" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38232" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:18 utm-1 ulogd[7924]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60005" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.205.89" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38232" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:19 utm-1 ulogd[7924]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62001" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.201.88" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38232" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:19 utm-1 ulogd[7924]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60005" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.205.89" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38232" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:19 utm-1 ulogd[7924]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="62001" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.201.88" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38230" dstport="2048" tcpflags="SYN"
2020:12:16-20:23:19 utm-1 ulogd[7924]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60005" outitf="lo" srcmac="00:00:00:00:00:00" srcip="10.0.201.88" dstip="10.0.205.89" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="38230" dstport="2048" tcpflags="SYN"
Chain OUTPUT (policy DROP)
num target prot opt source destination
1 LOGDROP tcp -- !127.0.0.0/8 0.0.0.0/0 tcp spts:1024:65535 dpt:4444 LOGMARK match 60005
2 LOGDROP tcp -- !127.0.0.0/8 0.0.0.0/0 tcp spts:1:65535 dpt:2048 LOGMARK match 60005
3 LOGDROP tcp -- 0.0.0.0/0 127.0.0.1 tcp dpt:4472 owner UID match 100
4 GEOIP_OUT all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,RELATED
5 LOCAL_RESTAPI tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3002
6 LOCAL_RESTAPI tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3498
7 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
8 ACCEPT all -- 0.0.0.0/0 !224.0.0.0/4 CONFIRMED match
9 CONFIRMED all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED
10 CONFIRMED all -- 0.0.0.0/0 0.0.0.0/0 -m condition --condition "OUTPUT_ACCEPT_ALL" owner UID match 0 owner GID match 0
11 CONFIRMED tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1:65535 dpt:443 owner UID match 815 owner GID match 815
12 HA_OUT all -- 0.0.0.0/0 0.0.0.0/0
13 SANITY_CHECKS all -- 0.0.0.0/0 0.0.0.0/0
14 AUTO_OUTPUT all -- 0.0.0.0/0 0.0.0.0/0
15 USR_OUTPUT all -- 0.0.0.0/0 0.0.0.0/0
16 LOGDROP all -- 0.0.0.0/0 0.0.0.0/0 LOGMARK match 60003
This thread was automatically locked due to age.