<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Allow external access to webserver from set IP(s) only</title><link>https://community.sophos.com/utm-firewall/f/web-server-security/114161/allow-external-access-to-webserver-from-set-ip-s-only</link><description>Hi all. So just at the very beginning of my journey with UTM and learning more by the minute. However, I&amp;#39;m a bit stumped when it comes to webserver access. 
 I&amp;#39;ve set up my real and virtual webservers. All work fine except I want to limit access to them</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Allow external access to webserver from set IP(s) only</title><link>https://community.sophos.com/thread/409727?ContentTypeID=1</link><pubDate>Sat, 20 Jul 2019 19:55:22 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:564be9f4-93a4-45e1-b26c-2cc154e7ffa0</guid><dc:creator>Bill Brewster</dc:creator><description>&lt;p&gt;Thanks so much Douglas. I was actually in the process of replying to my own post saying I should have read the Rulz because that explained the stacking order for filtering of which firewall rules are last after proxies hah!&lt;/p&gt;
&lt;p&gt;I was setting up a DNAT to a blackhole then bypassing that for allowed IPs when you replied which made me grin as I would have taken forever to find that little checkbox on the site path route tab. Thanks again for saving me considerable time and explaining it to me :).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Allow external access to webserver from set IP(s) only</title><link>https://community.sophos.com/thread/409719?ContentTypeID=1</link><pubDate>Sat, 20 Jul 2019 19:42:48 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ea9ef237-7730-4d33-867d-bf4855476dcf</guid><dc:creator>DouglasFoster</dc:creator><description>&lt;p&gt;Yes, you can restrict by user, by IP address, or both.&lt;/p&gt;
&lt;p&gt;To restrict by source IP&lt;/p&gt;
&lt;p&gt;Site Path Routing...&amp;nbsp; Edit one of the paths...&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Check the box for &amp;quot;Access Control&amp;quot;.&amp;nbsp; &amp;nbsp;Two list boxes will appear, one for Allowed Networks and one for Denied Networks.&amp;nbsp; &amp;nbsp;Define your Allowed Networks and click [Save]&lt;/p&gt;
&lt;p&gt;This allows you to have different restrictions for different parts of the website, but it also means that you need to configure each applicable Site Path Route.&lt;/p&gt;
&lt;p&gt;To restrict by user&lt;/p&gt;
&lt;p&gt;Define a Reverse Protection rule and apply it to the Site Path Route(s).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On architecture, you have experienced the normal new-user surprise.&amp;nbsp; UTM is a series of mutually-exclusive packet filters.&amp;nbsp; &amp;nbsp;&amp;quot;Firewall Rules&amp;quot; is the packet filter of last resort, which is invoked only when the packet bypasses all of the more sophisticated filtering tools.&amp;nbsp; UTM is also not directional.&amp;nbsp; &amp;nbsp;It only knows &amp;quot;inside&amp;quot; and &amp;quot;outside&amp;quot; based on the rules that you create.&amp;nbsp; The WiKi section has several articles that address information needed by new users, but which is not in the manuals.&amp;nbsp; &amp;nbsp;Also look for the post titled &amp;quot;Rulz&amp;quot;, which has important information, including the hierarchy of events in packet processing.&lt;/p&gt;
&lt;p&gt;UTM takes a different kind of thinking than with other firewalls, but it works after you understand the architecture.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>