Machine communication with Scalance S615 without gateway

Today I would like to show you how to set up a Siemens Scalance S615 firewall. This configuration allows you to access a plant network from a company network. You can do this without both networks having the Scalance entered as the default gateway.

Setup

PC 192.168.10.179 (VLAN 2 EXT) NO Gateway
SCLANACE 192.168.1.1 (VLAN 1 INT) and 192.168.10.1 (VLAN 2 EXT)
MACHINE 192.168.1.99 (VLAN 1 INT) NO Gateway

1. NETMAP

The PC communicates with 192.168.10.99 (Alias IP) from its own network, which is translated using a destination NAT. The machine behind this is 192.168.1.99.

2. Source NAT

The machine thinks the packet comes from 192.168.1.1 (Source NAT) and can send a response packet without a gateway because it thinks the packet comes from the same subnet.

    3. Firewall Rule

    Don’t forget to set the corresponding entry in the firewall rules. „Auto Firewall Rule“ in the NETMAP can be helpful to automatically create an entry, but with a custom or customized entry the rule can be formulated more specifically.

    Terms

    Announce alias IP addresses

    • Sends a gratuitous ARP to announce the IP address.
    • This happens without an ARP request when creating NAT rules or rebooting the appliance.

    Alias ​​IP

    • NAT IP is registered on the source or destination interface.
    • CAUTION with entire subnets! In combination with „Announce Alias ​​IP addresses,“ each IP address is announced on the network with the MAC address of the router interface. This could produce a network outage.

    BIDIRECTIONAL Rule

    • Enters a second rule from the other direction.
    • This is important if the other side also wants to initiate the connection.

    Links 

    SCALANCE S615 Getting Started 

    SCALANCE S615 Web Based Management 

    NAT mit SCALANCE SC-600/ M-800/ S615 

    Dynamic Firewall Objects for AWS and Azure

    How to create a dynamic object with the public ip addresses used by AWS or Azure.

    • For standalone Firewalls SSH into the CloudGen Firewall
    • For managed Firewalls SSH into the Control Center Box Level

    Example command to create a dynamic network object with the IP addresses of the AWS EU-Central-1 region:

    # external-netobj-tool create Aws.Datacenters.Eu-central-1
    • The dynamic object is automatically updated every hour

    After creation it should look like this:

    Dynamic rule example
    Example of the dynamic object

    How to increase the Firewall Monitor history on a Barracuda CloudGen Firewall

    Issue

    Solution

    • Statistics database is stored in
      • /var/phion/appstat
    • Can be increased depending on available disk size
      • Different per appliance
      • Value 0 means automatic adjustment
        • No Barracuda Campus documentation found that describes the mechanism behind it
    • After the changes, keep an eye on the resources in the CONTROL tab
    CONFIGURATION > Configuration Tree > Box > Infrastructure Services > General Firewall Configuration