Ok, so I have a SonicWall TZ 205 that is providing perimeter security for a small office. The crux of my problem is this, users are not able to access published services over the public IP when behind this device.
The Situation:
There are 3 zones and 2 border devices involved here.
Zone: Ye Olde Internet
Device: Standard ISP provided cable modem (out: Public IP in: 192.168.1.1)
Zone: a "proto dmz" network shared with unrelated and uncontrolled routers/devices
Device: The TZ 205 GW (out:192.168.1.10 in:10.1.1.254)
Zone: Office LAN
Note: There are port mapping rules setup on both devices which are working correctly. Also while I can configure the modem, I can not place the other devices behind the GW. (consider them other tenants) As such I can't take the obvious shortcut and just assign the public ip to the GW.
Traffic flows properly from traffic originating on the WAN to published hosts on the LAN and vice versa. Even traffic from the LAN to 192.168.1.10 is allowed properly.
However, traffic from the LAN to the public IP for internal services (eg https) is dropped with a "Land attack dropped" message. E.g.
Source 192.168.1.10, 28827, X1
Destination 192.168.1.10, 80
I have a general idea of what that filter is looking for, but how do you tell it to EXEMPT this particular traffic? I just can't figure out where the setting is or what rule to make. I feel like I'm missing something obvious :-\