Last adaptation to the version: 14.0.1 (01.2025)
- Warnung für Sites ohne dst_dom*-ACL
notempty
- With v12.7.0, nginx can be selected as the reverse proxy engine
- Changing the engine will most likely result in an adjustment of the configuration, as each engine supports different features.
- Unsupported settings are marked after the changeover
Intended use
With a reverse proxy, one can control access to the "internal" web servers from the Internet. In contrast to a port forwarding, dedicated filter rules can be created via the reverse proxy. In addition, with only one public IP address, several internal web servers can be addressed based on the domain.
Another highlight is offered by the load balancing. Servers can be combined into groups, to which the requests are then distributed using the selected algorithm (e.g. Round-Robin).
Requirements
The following values are assumed for the example configuration:
- Web server with the private IP: 10.1.0.150
- Domain: www.ttt-point.de
Preparations
- Attention:
If the web server is also to be accessed via https, the port of the Userinterface must be changed first.
- For https, the reverse proxy needs a certificate to accept the encrypted connection.
- For this, a certificate is used from
In this example, a wildcard certificate *.ttt-point.de is used.
Packet filter rule
For the reverse proxy to be reachable, the following packet filter rule must be in place. This can be checked under
. If this is not present, will add this rule.# | Source | Destination | Service | NAT | Logging | Acion | Active | ||
![]() |
Accept | On |
Configuration
Wizard
Step 1 - Internal
Step 1 - Internal: Target server already exists as a network object | |||
Caption | Value | Description | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() |
---|---|---|---|
Target Server: | If the host has already been created as a network object, it can be selected directly in the drop-down menu. | ||
Add network object | If no network object has been created yet, a network object can be created using this button. | ||
Port: | 443 | The web server should be accessed via an encrypted connection. | |
Use SSL: | On | Determines whether SSL can be used | |
[ - ] Advanced settings notempty These TLS settings apply to the connection between this appliance and the (local) server.
For TLS settings between the clients and this appliance, the settings in the Area Reverse-Proxy dialog apply. | |||
Use default TLS settings: | Yes | Allows connections with TLS 1.2 or 1.3 only | |
Minimal TLS version: | The outdated TLS versions 1.1 and 1.0 can be selected. | ||
Cipher-Suite: | Standardwert verwenden | Note that to directly use a OpenSSL security level, the notation @SECLEVEL=N can be used in the cipher string, where N represents the selected level from 0 to 5.
| |
Step 2 - ExternalDefine incoming connection | |||
External domain name: | www.ttt-point.de | Here you enter how the server behind the UTM is addressed. |
![]() |
Step 3 - External (Global) | |||
Mode | Mode to be used | ![]() | |
Proxy-Port: | 80 | Port for the proxy of the corresponding server | |
SSL-Proxy Port: | 443 | Port for the SSL proxy of the corresponding server | |
SSL certificate: | The certificate that was selected in the step Preparations is selected here. | ||
Step 4 - Authentication | |||
Forward authentication: | The proxy should not perform authentication | Datei:UTM v12.7.0 Reverse Proxy Wizard Schritt 4-en.png | |
Forwards the client's authentication headers to the remote station. Login data received from the UTM is sent to the reverse proxy. Authentication is not required for this option. | |||
Proxy and authentication headers are forwarded unchanged. Sends the login data received from the client to the reverse proxy. Both proxy and WWW authorisation headers are forwarded to the remote peer without modification. | |||
Login name | |||
Password | |||
Server groups | |||
The arrangement in server groups makes it possible to display different relationships in the reverse Proxy:
| |||
Adds a new server group. The wizard automatically creates a server group. |
UTMuser@firewall.name.fqdnApplication ![]() | ||
Name | server-www.ttt-point.de | Name | |
Server | www.ttt-point.de (10.1.0.150) … | List of network objects that belong to the server group | |
IP address Port: SSL: … |
Hovering with the mouse shows further details about the network object | ||
Edit | Opens the dialog for editing a server group (add or delete server) | ||
Delete | Deletes the server group (confirmation required) | ||
Edit server group - nginxGeneral | |||
Name | server-www.ttt-point.de | Name of the server group (not editable) | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() |
Use SSL | Yes | Determines whether SSL can be used | |
Authentication | |||
Forward authentication: | The proxy should not perform authentication | ||
Forwards the client's authentication headers to the remote station. Login data received from the UTM is sent to the reverse proxy. Authentication is not required for this option. | |||
Proxy and authentication headers are forwarded unchanged. Sends the login data received from the client to the reverse proxy. Both proxy and WWW authorisation headers are forwarded to the remote peer without modification. | |||
Login name: Only for Provide login data |
|||
Password: Only for Provide login data |
|||
Forward connection-oriented Microsoft authentication: notempty New as of v12.7.1 |
Enables support for NTLM, Negotiate and Kerberos | ||
Server | |||
Search field for the servers | |||
Network | www.ttt-point.de | Name | |
IP address | 10.1.0.150 | IP address of the webserver | |
Port | 443 | Port via which the server is to be addressed | |
TLS | Default @Sec Level=4 | TLS settings for this server | |
Delete | Deletes the server from the reverse proxy server group | ||
Edit notempty New as of v12.7.0 /
| |||
General | |||
Network | Name | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() | |
Opens the dialogue for adding a network object | |||
Port | 443 | Port via which the server is to be addressed | |
Advanced settings notempty These TLS settings apply to the connection between this appliance and the (local) server.
For TLS settings between the clients and this appliance, the settings in the Area Reverse-Proxy dialog apply. | |||
Use default TLS settings: | Yes | Allows connections with TLS 1.2 or 1.3 only | |
Minimal TLS version: | The outdated TLS versions 1.1 and 1.0 can be selected. | ||
Cipher-Suite: | Standardwert verwenden | Note that to directly use a OpenSSL security level, the notation @SECLEVEL=N can be used in the cipher string, where N represents the selected level from 0 to 5.
| |
Edit server group - squid | |||
General | |||
Name | server-www.ttt-point.de | Name of the server group (not editable) | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() |
Server | |||
Search field for the servers | |||
Network | www.ttt-point.de | Name | |
IP address | 10.1.0.150 | IP address of the webserver | |
Port | 443 | Port via which the server is to be addressed | |
SSL | Yes | Shows whether SSL is activated for the server | |
Type | Provide login data | Authentication type used by the server | |
Login name | {{#var:Leer} | ||
MS-Auth | aus | Status for connection-oriented Microsoft authentication (support for NTLM, Negotiate and Kerberos) | |
TLS | Default @Sec Level=4 | TLS settings for this server | |
Delete | Deletes the server from the reverse proxy server group | ||
Edit notempty New as of v12.7.0 /
| |||
General | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() | ||
Network | Name | ||
Opens the dialogue for adding a network object | |||
Port | 443 | Port via which the server is to be addressed | |
Use SSL: | Yes | Determines whether SSL can be used | |
Authentication | |||
Forward authentication: | The proxy should not perform authentication | ||
Forwards the client's authentication headers to the remote station. Login data received from the UTM is sent to the reverse proxy. Authentication is not required for this option. | |||
Proxy and authentication headers are forwarded unchanged. Sends the login data received from the client to the reverse proxy. Both proxy and WWW authorisation headers are forwarded to the remote peer without modification. | |||
Login name Only for Provide login data |
|||
Password Only for Provide login data |
|||
Forward connection-oriented Microsoft authentication: notempty Caption updated |
Enables support for NTLM, Negotiate and Kerberos | ||
Advanced settings notempty These TLS settings apply to the connection between this appliance and the (local) server.
For TLS settings between the clients and this appliance, the settings in the Area Reverse-Proxy dialog apply. | |||
Use default TLS settings: | Yes | Allows connections with TLS 1.2 or 1.3 only | |
Minimal TLS version: | The outdated TLS versions 1.1 and 1.0 can be selected. | ||
Cipher-Suite: | Standardwert verwenden | Note that to directly use a OpenSSL security level, the notation @SECLEVEL=N can be used in the cipher string, where N represents the selected level from 0 to 5.
| |
Sites | |||
Sites Hier können die Sites Einträge überblickt, bearbeitet ( ) und gelöscht ( ) werden. Falls ungültige Konfigurationen vorliegen, werden diese mit einer Warnung () versehen. Beim Hovern über diese Warnung wird außerdem eine kurze Beschreibung des Problems gezeigt. Neu ab v14.0.1 |
Area UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() | ||
Sites - ngnix | |||
Domain name: | www.ttt-point.de | This is where you enter how the server behind the UTM is addressed. | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() |
Server group: | The associated server group is selected here | ||
Client bandwidth: | 0 kbits/s | Maximum bandwidth that should be available to a client | |
Load distribution: | The connections are processed one after the other. | ||
A user's connections (hash on the user name) are always routed to the same server. | |||
Connections from the same source (IP address) are always routed to the same server. | |||
Redirect HTTP: Only with mode: |
No | When activated, HTTP requests are redirected to the HTTPS port | |
Websockets: | off | Activates Websockets connections for the site | |
Site-specific proxy port: | On 80 Default: off |
Enables a specific port for HTTP connections in this site | |
Site-specific SSL proxy port: | On 8443 Default: off |
Enables a specific port for HTTP connections in this site | |
Site-specific SSL certificate: | off | A site-specific server certificate can be selected | |
ACL Sets | Selection of an ACL set to be added | ||
Add | Add selected ACL set | ||
Pos. | ![]() |
The order of the ACL sets can be customised using drag and drop. | |
ACL Set | aclset-www.ttt-point.de | Name | |
Acion | Configuration of whether the ACL set should be permitted or prohibited | ||
Status | On | Activation or deactivation of the configuration for the ACL set | |
Delete | Deletes the entry for the ACL set | ||
Sites - squid | |||
Domain name: | www.ttt-point.de | This is where you enter how the server behind the UTM is addressed. | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() |
Server group: | The associated server group is selected here | ||
Site bandwidth: | 0 kbits/s | Maximum bandwidth that should be available to a site | |
Client bandwidth: | 0 kbits/s | Maximum bandwidth that should be available to a client | |
Load distribution: | The connections are processed one after the other. | ||
A user's connections (hash on the user name) are always routed to the same server. | |||
Connections from the same source (IP address) are always routed to the same server. | |||
Connections are processed one after the other, but there are weightings that determine how often the same connection is served in succession. | |||
ACL Sets | Selection of an ACL set to be added | ||
Add | Add selected ACL set | ||
Pos. | ![]() |
The order of the ACL sets can be customised using drag and drop. | |
ACL Set | aclset-www.ttt-point.de | Name | |
Acion | Configuration of whether the ACL set should be permitted or prohibited | ||
Status | On | Activation or deactivation of the configuration for the ACL set | |
Delete | Deletes the entry for the ACL set | ||
Combination exampleBy combining different ACL sets with corresponding authorisations, it is possible, for example, to ensure that the login page of a server can only be accessed from a specific (e.g. your own) public IP address.
| |||
ACL Sets | |||
Under ACLSets Button Button . Access rights can be assigned via ACLs. | Area |||
Type | Description | Example | UTMuser@firewall.name.fqdnApplicationReverse-Proxy ![]() |
Regex to the target domain | .*\ttt-point\.(de|com) | ||
Specifies the domain/IP of the destination server | www.ttt-point.de or IP address | ||
protoProtocol | http, https | ||
Filter on the header of the client | It could be determined, for example, the browser | ||
Specifies the source IP of the client | 87.139.55.127/255.255.255.255 | ||
Only for squid engine |
Regex to the domain | anyideas | |
Only for squid engine |
Specifies the domain of the sender | anyideas.de | |
Time specification | M T W H F 9:00-17:00 | ||
Regex for paths | ttt-point.de/login | ||
Options | |||
Caption | Value | Description | UTMuser@firewall.name.fqdnApplication ![]() |
Engine: notempty New as of v12.7.0 |
Selection of the engine to be used between nginx (new) or squid Save . | ||
Mode: | Mode to be used | ||
Proxy-Port: | 80 | Port for the proxy of the corresponding server | |
SSL-Proxy Port: | 8443 | Port for the SSL proxy of the corresponding server | |
SSL certificate: | Certificate for the corresponding server | ||
Websocket Timeout: notempty New as of v12.7.0 |
60 | Defines the time for a websocket timeout | |
Activate certificate-based authenticationActivate certificate-based authentication
updated
| |||
SSL-CA: | Certificate for certificate-based authentication | ||
Import of personal certificates
notemptyIn order for the Enable certificate-based authentication function to be used correctly, the personal certificate must be available in the browser used.