I have been evolving my configuration through the following thread and I'm very happy with the responses I'm getting:
ER-X Switch VLAN PVID and VID and Trunk Port
I think the bulk of my configuration is good, but I'll need to test during some network quiet time. For some background, I'm hosting my private VLAN on switch0.3 where the bulk of my household devices will live. I'm also hosting a public subnet from my ISP (x.y.z.136/29) and am using a VLAN on switch0.4 to isolate that traffic and get the data to my household switch port, where some virtual machines are hosted using public IPs.
I used the Basic wizard, and setup the Eth0 interface to handle a PPPoE connection. That all seems to work fine. My question concerns the default firewall rules that are generated for the PPPoE interface. I'm trying to wrap my head around the firewall terminologies and am using this thread to start:
My question is this: Do the default firewall rules on the PPPoE interface block ALL unsolicited traffic, regardless of the protocol, destination, etc.?
Default PPPoE Firewall Rules
It is my understanding that it would block everything, as that would be most sensible, but I would rather not test that understanding with fire just yet. On establishing my PPPoE connection, that is assigned a static IP by my ISP. They are then using that static IP to route my x.y.z.136/29 subnet to me. On my switch0.4 VIF, I have assigned x.y.z.137/29 as the interface address, which should act as the gateway for that /29 subnet. What happens to the /29 subnet at the firewall? In my head, I feel like maybe the /29 rides the PPPoE link to inside the router, thus bypassing the WAN firewall rules. But that is just a feeling. Ideally, the entire /29 will be completely blocked at the WAN port...if not, then can someone tell me what needs to be done for that?
For testing, I could then gradually isolate all the networks, then start opening up the WAN port for the /29 to expose the virtual machines, while still protecting the private network. I hope this makes sense.