Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


pomtom44

128 posts

Master Geek


#242191 15-Oct-2018 16:12
Send private message

Hey all
I have a issue with my firewall on my USG

I have two vlans setup, Vlan 10 and 40
I have a PC on vlan 10 and a server on vlan 40

I have a rule setup to stop cross talk between the vlans, which works fine.
I then went to set a rule to allow ssh and http between the PC and the server.

First I found that I had to set a rule for both directions, PC->Server and then a reply back from Server -> PC
So I created a group with both the server and the PC's IP addresses and set a single rule from group to group
Rather than having two rules for each direction.
This worked fine.

I then went to add a port group to the rule to limit it to just ssh (22), and applied it to the firewall.
Broken.

If I allow any traffic it works fine, but the moment I add a port restrction it breaks.

Screenshots attached for reference.


Create new topic
dfnt
1511 posts

Uber Geek

Lifetime subscriber

  #2108303 15-Oct-2018 16:35
Send private message

I think the problem is due to the fact that the source port is usually a random high port, as opposed to being the same as the destination port so the return traffic is being blocked. You want to allow related and established packets through your vlan in/local interface.

 

I use an edgerouter, and the below is how I have setup my vlan's:

 

Click to see full size

 

Click to see full size

 

Click to see full size

 

Click to see full size

 

Click to see full size

 

The default action on both GWN_IN and GWN_LOCAL is drop, so you'll see I allow specific things like DNS and DHCP. In addition I allow GWN to talk to anything apart from 192.168.0.0/16 so that it can access the internet, but not access anything in other vlans unless I've specified it above.

 

Not sure how that translates to USG but hopefully that'll help




pomtom44

128 posts

Master Geek


  #2108310 15-Oct-2018 16:49
Send private message

dfnt:

 

I think the problem is due to the fact that the source port is usually a random high port, as opposed to being the same as the destination port so the return traffic is being blocked. You want to allow related and established packets through your vlan in/local interface.

 

I use an edgerouter, and the below is how I have setup my vlan's:

 

Click to see full size

 

Click to see full size

 

Click to see full size

 

Click to see full size

 

Click to see full size

 

The default action on both GWN_IN and GWN_LOCAL is drop, so you'll see I allow specific things like DNS and DHCP. In addition I allow GWN to talk to anything apart from 192.168.0.0/16 so that it can access the internet, but not access anything in other vlans unless I've specified it above.

 

Not sure how that translates to USG but hopefully that'll help

 




I already have related and established enabled on the rule
Could it be getting confused as the fact its only one rule for both directions?
Trying to be clever and reduce the number of rules, but trying to do too much


vulcannz
436 posts

Ultimate Geek
Inactive user


  #2108324 15-Oct-2018 17:15
Send private message

With a "normal" firewall we usually only talk about stateful connections. The firewall usually maintains a state table, so any returning traffic is automatically allowed. So only a single rule is required. That whole new/related/established stuff is quite odd from a 100% firewall point of view. 

 

I'd wager its to do with your "Test IP" using both addresses in the source and destination parts of the rule. Then that weird ass statefulness check is screwing the return traffic up (due to it being on a port > 1024).

 

Make your address objects individual, that or get a real firewall :D

 

 

 

 




dfnt
1511 posts

Uber Geek

Lifetime subscriber

  #2108421 15-Oct-2018 19:24
Send private message

Have you got any firewall rules on your main lan interface? I don't.

 

Also, you don't specify source ports, just leave that as ANY and the destination ports will be whatever you want

 

And put the established/related as its own rule at the very top as having it combined with your attempted rule isnt going to match any reply traffic

 

e.g.:

 

Click to see full size


Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.