Nov 24 09 2:31 am
Nov 24 09 12:07 pm
Nov 24 09 6:40 pm
genie wrote:Have you tried ENS/TR with no restrictions (just to make sure ENS is functional)?
Nov 24 09 7:42 pm
Nov 24 09 8:15 pm
genie wrote:Pinging does not involve TR process - meaning that traffic is handled in the driver without being passed up to the engine - it is good it works, though, but, please, let us know if this non-TR test for HTTP goes through.
Nov 25 09 4:05 am
Nov 25 09 10:56 am
Alen wrote:Tests done:
1. NAT with TR enabled for web proxy - the site is accessible!
2. Ping to Internet address (url: google.com) is not going (what was expected), but one more time I saw DNS is resolving names.
What may be the reason?
As I understand, NAT (ENS) restrictions (particularly white list created in Advanced tab of ENS service policy) are working also when TR is enabled. And thus this means the problem is not in restritions either!?
Alen wrote:
What could be the reason?
Default gateway and DNS ip are specified on the client PC (and both are Wingate server LAN ip).
So pure proxy and NAT+TR work fine, pure NAT doesn't!?
What else to check? (I also enabled Everyone can access from the network Wingate PC OS policy I changed previously, this doesn't help too, as was also expected).
Nov 25 09 8:19 pm
adrien wrote:I just checked the source code. When we intercept a connection, then report it to the engine, The ENS policies are not checked, so it will then only use the proxy policy.
We had one other report of problems with ENS policies that check server IP. There were some changes in this area in 6.6.4. If you change your ENS policy to not mandate a specific server IP does it grant access then? I may have introduced a bug in 6.6.4, we need to try and replicate.
Nov 26 09 5:19 am
Nov 26 09 9:47 pm
I just checked the source code. When we intercept a connection, then report it to the engine, The ENS policies are not checked, so it will then only use the proxy policy.
Nov 26 09 10:43 pm
Alen wrote:Finally tried without restrictions.
The result: NAT is working.
As soon as I add even one filter with one criterion in Advanced tab, particularly "Server name" contains "google", google.com becomes inaccessible (I remind you the target is to allow only a few sites and ips to be accessible via NAT)!
So, the problem is in filters!
Alen wrote:And some more strange things: when I was adding filters, I mention the glitches with filter numbers. For example, after adding filter 3 I got again filter 3 when added next filter!
Besides, today during the test I create and delete many filters, and every time I added new filter after cleaning all filters I got the next number, e.g. filter 8, not filter 1, as it should be...
Alen wrote:Adrien, I can't deploy Wingate until I solve the problem. Is any possibility to solve it fast or I have to wait till next update?
Nov 26 09 10:48 pm
Alen wrote:I just checked the source code. When we intercept a connection, then report it to the engine, The ENS policies are not checked, so it will then only use the proxy policy.
BTW, I think this is absolutely wrong. Users (me for example) expect Wingate is checking NAT policies, even if TR is used! I think NAT policies should be checked first, and then policies of the respective proxy. (But of course, the best is to add an option - checkbox: whether to check intercepted traffic by the "native" (NAT in this case) policies first before sending to intercepter-proxies).
Nov 27 09 12:38 am
adrien wrote:I wouldn't expect the "Server name" criterion to work for NAT against a site name, since the SYN packet only contains an IP address, and we'd have to rely on reverse DNS.
In fact I don't think we do reverse DNS for NAT to try and figure out a server name. I checked the code, and it just converts the server IP to a string, so you'd have something like "210.55.214.35" rather than "smtp.qbik.com".So if you were checking against contains google, then it would fail on all sites (even google, since it would be comparing the IP).
adrien wrote:I think this would create many problems, since it would be easy to break intercepts with ENS policy. Once the proxy has the connection, you can exert a lot more policy control over it than ENS policy can.
Nov 27 09 8:01 pm
Dec 02 09 12:28 am
adrien wrote:When we intercept a connection, then report it to the engine, The ENS policies are not checked, so it will then only use the proxy policy.
adrien wrote:I wouldn't expect the "Server name" criterion to work for NAT against a site name