Hi folks on community
I have downloaded below configuration from the forum, but I can't get LAN to DMZ working properly.
On DMZ I have a HTTP server with Wordpress. When accessing from WAN there is no problem in connecting to PHP, but when trying to access from LAN I get the error message "Hmm, we can't open this page". If I try to access the index.html page, then I get the connection.
So the issue is to set up a rule that allows the LAN to access the DMZ through the WAN - Please help me.
firewall { all-ping enable broadcast-ping disable group { network-group BOGONS { description "Invalid WAN networks" network 10.0.0.0/8 network 100.64.0.0/10 network 127.0.0.0/8 network 169.254.0.0/16 network 172.16.0.0/12 network 192.0.0.0/24 network 192.0.2.0/24 network 192.168.0.0/16 network 198.18.0.0/15 network 198.51.100.0/24 network 203.0.113.0/24 network 224.0.0.0/3 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name LAN_IN { default-action accept description "Wired network to other networks." } name LAN_LOCAL { default-action accept description "Wired network to router." } name WAN_IN { default-action drop description "Internet to internal networks" enable-default-log rule 20 { action accept description "allow established/related" log disable state { established enable related enable } } rule 30 { action drop description "drop invalid" log enable state { invalid enable } } rule 40 { action accept description "allow port 25" destination { address 192.168.2.48 port 25 } log disable protocol tcp } rule 50 { action accept description "allow port 80" destination { address 192.168.2.45 port 80 } log enable protocol tcp } rule 60 { action drop description "drop BOGON source" log enable protocol all source { group { network-group BOGONS } } } } name WAN_LOCAL { default-action drop description "Internet to router" enable-default-log rule 10 { action accept description "allow established/related" log disable state { established enable related enable } } rule 30 { action drop description "drop invalid" log enable state { invalid enable } } rule 40 { action drop description "drop BOGON source" log enable protocol all source { group { network-group BOGONS } } } rule 50 { action accept description "rate limit ICMP 50/m" limit { burst 1 rate 50/minute } log enable protocol icmp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 152.115.xx.yyy/24 description WAN duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth1 { address 192.168.1.1/24 description LAN duplex auto firewall { in { name LAN_IN } local { name LAN_LOCAL } } speed auto vif 100 { address 192.168.100.1/24 description "Guest/IoT VLAN" mtu 1500 } } ethernet eth2 { address 192.168.2.1/24 description DMZ duplex auto poe { output off } speed auto } ethernet eth3 { description Local3 duplex auto poe { output off } speed auto } ethernet eth4 { description Local4 duplex auto poe { output off } speed auto } loopback lo { } switch switch0 { address dhcp description Switch mtu 1500 switch-port { interface eth3 { } interface eth4 { } vlan-aware disable } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth2 wan-interface eth0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name GuestVLAN100 { authoritative disable subnet 192.168.100.0/24 { default-router 192.168.100.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.100.50 { stop 192.168.100.200 } } } shared-network-name LAN1 { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 83.136.89.6 dns-server 83.136.89.4 lease 86400 start 192.168.1.38 { stop 192.168.1.243 } unifi-controller 192.168.1.38 } } shared-network-name LAN2 { authoritative disable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 83.136.89.6 dns-server 83.136.89.4 lease 86400 start 192.168.2.21 { stop 192.168.2.240 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth0 listen-on eth1 listen-on eth2 listen-on switch0 system } } gui { http-port 80 https-port 443 listen-address 192.168.1.1 listen-address 192.168.2.1 older-ciphers enable } nat { rule 1 { description HTTP destination { port 80 } inbound-interface eth0 inside-address { address 192.168.2.45 port 80 } log disable protocol tcp type destination } rule 2 { description PostIn destination { port 25 } inbound-interface eth0 inside-address { address 192.168.2.48 port 25 } log enable protocol tcp type destination } rule 5010 { description "WAN MASQ" log disable outbound-interface eth0 protocol all type masquerade } } ssh { listen-address 192.168.1.1 listen-address 192.168.2.1 port 22 protocol-version v2 } ubnt-discover { disable } upnp { listen-on eth1 { outbound-interface eth0 } listen-on switch0 { outbound-interface eth0 } } } system { gateway-address 152.115.xx.yy host-name ERPOE-5 login { user ubnt { authentication { encrypted-password xyxyxyxyxyxyx plaintext-password "" } full-name ubnt level admin } } name-server 83.136.89.6 name-server 83.136.89.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/Copenhagen } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */