This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DNAT and IP-Filter do not block traffic

Hi there,

today I really had to block traffic coming from a specific IP going to my UTM 9.705-3 trying massive IPSEC logins. 

Adding a firewall rule at #1 position did not work so I added a DNAT-rule to NAT all traffic coming from this IP going to my UTM to 240.x.x.x. and placed it on top of all NAT-rules.

But my IPSEC-log shows me that I am still flooded by this IP.

How can I protect my network when everything is passing my rules?

Thank you -

Chris

PS: 

And: why does an "iptables - L | grep IP-address" does not show my filter rule?



This thread was automatically locked due to age.
Parents
  • FormerMember
    0 FormerMember

    Hello ,

    Thank you for reaching out to Sophos Community.

    Can you please share a snapshot of a blackhole DNAT rule?

    You can delete the existing connections for a specific IP by running below command in shell.

    utm:/root # conntrack -D -s <source IP>

    utm:/root # conntrack -D -d <destination IP>

    eg: utm:/root # conntrack -D -s 12.12.12.12

Reply
  • FormerMember
    0 FormerMember

    Hello ,

    Thank you for reaching out to Sophos Community.

    Can you please share a snapshot of a blackhole DNAT rule?

    You can delete the existing connections for a specific IP by running below command in shell.

    utm:/root # conntrack -D -s <source IP>

    utm:/root # conntrack -D -d <destination IP>

    eg: utm:/root # conntrack -D -s 12.12.12.12

Children
  • Hi Yash, 

    I could delete 1 flow entries with contrack. And for 2min this connection did not reappear.

    Here is a screenshot for one example while blackhole-IP is "240.0.0.1"

    But the above rule is not covering all that IPs flooding our gateway since yesterday.

    The ipsec logfile is filling up with:

    packet from 52.112.254.86:3480: not enough room in input packet for ISAKMP Message

     pluto[8531]: packet from 52.112.254.86:3480: sending notification PAYLOAD_MALFORMED to 52.112.254.86:3480

     

    Cheers, Chris