This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

External traffic being processed by a single DNAT in my configuration is all being identified as "spoofed packets"

Hello everyone,

     So the problem I am experiencing is very strange and I'm not sure what it indicates is happening. I have a single network setup internally that is completely different than any of my other internal networks (192.168.28.0 /24) and what I am trying to do is give that network and the one resource that is using it (a MiCollab phone system server) the ability to be accessed over the internet.

The DNAT I have set up appears to be working because when I try communicating with that server from the outside (using a port scanner or a trace route at the moment) I can see from the firewall logs that the traffic is being processed by the NAT entry. Unfortunately, all traffic that is using that particular DNAT is being tagged as "spoofed packets" and end up getting denied. This "spoofed packet" message is one I've never seen before and I'm not sure why the traffic would be getting identified as such.

As far as I know, the network I chose to setup (192.168.28.0 /24) is not in use anywhere else internally, which is what some other posts suggested checking for regarding the spoofed packet messages, and so since that isn't the case I am at a loss for understanding what is happening and how to correct it.

All other external traffic to all of my other internal networks and servers is working normally as usual. This new network (192.168.28.0 /24) was a recent addition to the configuration and external traffic to it, is the only traffic displaying the problem behavior. Internally, the firewall has no problem communicating with the VLAN on the core switch or with the phone server on the other end (via pings or trace routes).

Anyone have any ideas as to what might be going on? (a sample of the firewall log is pictured below for clarity).

Thanks in advance!



This thread was automatically locked due to age.
  • Can you show us the DNAT rule you have created? From this log it looks like you are DNATing from inside to outside instead of the other way around.


    Managing several Sophos firewalls both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

  • Sure thing, here's a screen capture of the NAT in question:

    So based on your suggestion that it seemed like I had the configuration going in the wrong direction, I changed that initial "Any" entry to a network definition I had stored for "IPv4 Internet" instead just to see if that made a difference and it didn't

    It is also worth noting that the DNAT you see worked just fine, even with "Any" as the source object when I had a different destination IP address. So just based on that result alone, I don't think the structure of the NAT is the problem.

    The only difference between then and now is that the destination IP address that was used before was one that aligned with the rest of my network (a 172.28.0.0 /16  scheme) but my phone vendor suggested I create a network completely different from my current LAN and so I created a single C class network for this communication instead (192.168.28.0 /24)

    Still, with all the proper configuration programming in place, I don't see why that difference in and of itself would cause the packets to start being tagged as spoofed packets.

  • DNAT indeed seems right. Did you also segregate the traffic to a different physical or logical network segment? So the 192.168.28.0/24 should be connected either to a different interface on the UTM or a different VLAN. You shouldn't use 192.168.28.0 in the same network segment as your 172.28.0.0 devices. Maybe that's what's causing the spoofing message.


    Managing several Sophos firewalls both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

  • Hi Steve - your first posts - welcome to the UTM Community!

    Please show a simple, stick diagram with IPs so that we understand what's where.  Also pictures of the 'Interfaces' and 'Additional Address' tabs.  If you prefer, obfuscate IPs like 84.XX.YY.121, 10.X.Y.100, 192.168.X.200 and 172.2X.Y.51.  That lets us see immediately which IPs are local and which are identical or just in the same subnet.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA