Setup DMZ for WebServer on Sophos UTM 9699
Pages:
1
![]() |
LiquidLayer private msg quote post Address this user | |
How To Protect Your Web Server With Sophos UTM In this Howto I will show, how you can setup a webserver to be protected in the demilitarized zone of an enterprise grade firewall. I will use the Sophos UTM Gateway which is available as a software appliance to be installed on "any" hardware and is free for home and personal use. The Scenario I will setup a firewall with three network interfaces with the following IP addresses: eth0: WAN interface (ethernet) eth1: LAN 192.168.0.1/24 with DHCP eth2: DMZ 10.0.0.1/24 without DHCP and a webserver 10.0.0.10, that should be exposed externally. In your scenario the addresses might differ, but you should use 3 interfaces to have a dedicated demilitatized zone. See screen shots and the remaing Howto here: https://www.howtoforge.com/how-to-protect-your-web-server-with-sophos-utm |
||
Post 1 IP flag post |
![]() |
LiquidLayer private msg quote post Address this user | |
http://fastvue.co/sophos/blog/how-to-publish-websites-with-sophos-utm-web-server-protection/ How To Publish Websites with Sophos UTM Web Server Protection Publishing an internal website securely to the Internet goes by a number of names such as Reverse Proxy, Web Application Proxy (WAP) and Web Application Firewall (WAF). Sophos UTM refers to this functionality as Web Server Protection. In this article, I will take you through the steps of publishing an internal website (using the Fastvue Sophos Reporter application as the example web app) using the Sophos UTM Web Server Protection feature. To ensure the implementation goes smoothly, the following steps should be performed in order: Register a public DNS record (Optional) Add an additional IP address Define a Real Webserver Create a Virtual Server Secure with HTTPS 1. Register a public DNS record Since registering a domain (if needed) and propagating DNS records can take some time, you should start here. You will need to create an A record pointing to the public IP address you will be using. The name is important to know before you proceed because it will be specified as an allowed domain when securing your virtual server, and it will also be used in the SSL certificate. It is however possible to complete these steps using the IP address only, which may be suitable if you are just testing before going live with a public name. 2. Add an additional IP address Multiple public IP addresses are a great way to separate discreet services on the UTM, and you will need to add an additional interface for the Web Server Protection feature. To add an additional IP address: Select Interfaces and Routing | Interfaces Select the Additional Addresses Tab Click the + New additional address… button Specify a name for the address (I use the IP out of habit but you can call it anything you like) Select the interface (WAN) Specify the actual IP address Select the netmask of /32 Click Save After the address is added, it is in an off state by default. You will have to enable it by clicking the toggle switch. Sophos UTM Add Network Definition Sophos UTM Additional Address By default, other services such as SSL VPN and User Portal use the ANY network as the IP address on which they are available. In this context, ANY refers to all IP address assigned to the Sophos UTM. To prevent your newly created IP address from being claimed by these other services using the ANY interface, make sure the other services have been configured with specific addresses. For example, one conflicting service you may run into is the SSL VPN. Here is how to resolve the potential conflict: Go to Remote Access | SSL | Settings. You will see that the interface address is ANY by default Click the folder icon next to the Interface Address field. Select and drag the External (WAN) (Address ) into the Interface Address field. Sophos UTM SSL Settings 3. Define a real webserver The real web server is your actual internal web server’s IP address that is bound to the web site you want to publish. This is where the Sophos UTM will send traffic after it is received from the Internet. In our example it is our Sophos Reporter web server. Go to Webserver Protection | Web Application Firewall | Real Webservers Click the +New Real Webserver button Specify a name for the Webserver (such as fastvue01) Click + icon to define the host Specify the name of the server, set Type as Host, and enter the IP address. Click Save Back on the Real Webserver configuration, select Type: Plaintext (HTTP), and enter Port: 80 Click Save Sophos UTM Real Webservers 4. Create a Virtual Webserver Next you need to define the Virtual Webserver. This will be the external facing IP address available from the Internet. Go to Webserver Protection | Web Application Firewall | Virtual Webserver Click the + New Virtual Webserver button Specify a name for the Virtual Webserver, such as Fastvue. Interface: Select the new IP address we created earlier Type: Plaintext Port: 80 Domains: Click the + icon and add the public IP address (for testing) Click + again and specify the FQN name for the public DNS record created in step 1. The real web server should contain the server created earlier. Check the box to enable it. Firewall Profile: Basic Protection Click the Save Button Sophos UTM Virtual Webservers This completes the process of publishing the server with HTTP. To test, click the Open Live Log button. This will open the log so that you can track access to the virtual server. From an Internet connected machine, enter the public IP address into your browser. The internal website should load in the browser, and you should see the log the events in the Live Log. 5. Securing with HTTPS The next step would be to secure the site using HTTPS. A typical example of this would be to perform SSL offloading where web traffic over the Internet is encrypted, but not encrypted on the internal network. This means that the Fastvue Sophos Reporter server does not carry the overhead of performing SSL encryption. Instead this is performed by the UTM. This means that traffic on the internal trusted network is not encrypted, but traffic leaving the Sophos UTM to the internet is encrypted. The tricky part, as always with SSL, is certificates. For the sake of simplicity I am going to step through generating a self signed certificate that is valid for the external IP address. Go to Webserver Protection | Certificate Management Click the + New Certificate Button Specify a Name for the Certificate Method: Generate Keysize: 2048 Bits VPN ID Type: IP address VPN ID: Specify the public IP address Enter your Address and Organisation details. Click the Save button. Sophos UTM Certificate Management Next, we are going to convert the existing plain text HTTP Virtual Webserver to an Encrypted HTTPS Virtual Webserver. Select Webserver Protection | Web Application Firewall | Virtual Webserver Select the virtual server created earlier Change the Type to Encrypted (HTTPS) Check the ‘Redirect HTTP to HTTPS’ checkbox Certificate: Select the certificate created earlier You should notice the domain is populated and cannot be edited as this value is retrieved from the certificate Click the Save button. Sophos UTM Virtual Webserver You have now converted your virtual server from HTTP to HTTPS. The Redirect HTTP to HTTPS checkbox means that the Sophos UTM will still listen on port 80 but it will send the browser a 302 redirect to ensure the traffic is always bumped up to HTTPS. To test, open a browser and connect to http://thepublicip/. You should observe the URL in the address bar changing to HTTPS. Conclusion You have now securely published your internal Fastvue Sophos Reporter application to the public Internet using Sophos UTM’s Web Server Protection. Beyond this guide, you should create and use an SSL certificate that contains the correct public DNS name. Since this is public, I generally always recommend using a 3rd party certificate from a public certificate authority. This prevents certificate warnings on external devices. I also encourage you to experiment with the different firewall profiles that Sophos UTM offers aside from the ‘Basic Protection’ profile we selected in the above steps, as well as the Reverse Authentication feature introduced in Sophos UTM 9.2. This is useful for sites such that require corporate authentication details such as SharePoint, Outlook Web Access, and even Sophos Reporter when using Windows Authentication in IIS. I hope this helps anyone looking to configure Web Server Protection in Sophos UTM. Please let me know how you go in the comments! By Etienne Liebetrau|June 30th, 2014|How To, Sophos Reporter, Sophos UTM, Sophos UTM Reporting|5 Comments Related Posts: How To Secure The Fastvue Sophos Reporter Web Site How To Secure The Fastvue Sophos Reporter Web Site How to Deploy Sophos UTM on Hyper-V in 7 Simple Steps How to Deploy Sophos UTM on Hyper-V in 7 Simple Steps Sophos UTM and Active Directory Step by Step Integration Guide Sophos UTM and Active Directory Step by Step Integration… About the Author: Etienne Liebetrau Based in Cape Town, South Africa, Etienne is an IT Professional working in various environments building, testing and maintaining systems for a large national retail chain. An IT professional since 1996, Etienne has worked in various environments and is certified by Comptia, Dell and Microsoft. Etienne is the technical blogger and primary technical consultant for FixMyITsystem.com a solutions provider company based in Cape Town with a global client base. 5 Comments Como fica o reverse proxy pós Forefront TMG e UAG | Microsoft Space - Uilson Souza July 7, 2014 at 5:40 pm - Reply […] da FastVue postou um artigo com os passos para se montar um proxy reverso usando Sophos – veja em http://fastvue.co/sophos/blog/how-to-publish-websites-with-sophos-utm-web-server-protection/ […] Robert Kruk July 14, 2014 at 11:11 pm - Reply Great write up! Noel November 17, 2014 at 10:52 am - Reply Thanks for posting. I’ve tried the above procedure but I’ve noticed that the verisign certificate that is being used by the server is not recognized as valid when accessed from the internet. Can someone help me on this? TIA Etienne Liebetrau December 12, 2014 at 3:27 pm - Reply Hi Noel The certificate can be rejected for a few reasons like being expired or not being issued by a trusted Root CA. One of the most common problem I have found is that the domain names being used are not valid for the certificate. Check the certificate’s details for common and alternate names and make sure that that is what is configured on the UTM and that it matches the DNS record being used for the IP address. Aira March 17, 2015 at 9:14 am - Reply Great job, even better detailed than the Sophos articles that I found. Leave A Comment See screen shots and KB Info here: http://fastvue.co/sophos/blog/how-to-publish-websites-with-sophos-utm-web-server-protection/ |
||
Post 2 IP flag post |
Pages:
1