Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Not able to ping guest network from router(LOCAL)

$
0
0

Hello,

 

I'm using UAP lite in conjunction with the ERL. Currently I have 4 zones - LOCAL, GUEST, LAN & WAN being my FW presented as follows:

 

 all-ping enable
 broadcast-ping disable
 ipv6-receive-redirects disable
 ipv6-src-route disable
 ip-src-route disable
 log-martians enable
 name GUEST-LAN {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
 }
 name GUEST-LOCAL {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
     rule 53 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 6768 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
 }
 name GUEST-WAN {
     default-action drop
     rule 1 {
         action accept
         description "Allow all connections"
         state {
             established enable
             new enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
 }
 name LAN-GUEST {
     default-action drop
     rule 1 {
         action accept
         description "Allow all connections"
         state {
             established enable
             new enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
 }
 name LAN-LOCAL {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
     rule 22 {
         action accept
         description "Allow SSH/SFTP"
         destination {
             port 22
         }
         protocol tcp
     }
     rule 23 {
         action accept
         description "Allow TELNET"
         destination {
             port 23
         }
         protocol tcp
     }
     rule 53 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 80 {
         action accept
         description "Allow HTTP/HTTPS"
         destination {
             port 80,443
         }
         protocol tcp
     }
     rule 100 {
         action accept
         description "Allow PING"
         protocol icmp
     }
     rule 123 {
         action accept
         description "Allow NTP"
         destination {
             port 123
         }
         protocol udp
     }
     rule 6768 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
 }
 name LAN-WAN {
     default-action drop
     rule 1 {
         action accept
         description "Allow all connections"
         state {
             established enable
             new enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
 }
 name LOCAL-GUEST {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
     rule 53 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 100 {
         action accept
         description "Allow PING"
         protocol icmp
     }
     rule 6768 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
 }
 name LOCAL-LAN {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
     rule 53 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 100 {
         action accept
         description "Allow PING"
         protocol icmp
     }
     rule 123 {
         action accept
         description "Allow NTP"
         destination {
             port 123
         }
         protocol udp
     }
     rule 6768 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
 }
 name LOCAL-WAN {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
     rule 22 {
         action accept
         description "Allow SSH/SFTP"
         destination {
             port 22
         }
         protocol tcp
     }
     rule 23 {
         action accept
         description "Allow TELNET"
         destination {
             port 23
         }
         protocol tcp
     }
     rule 25 {
         action accept
         description "Allow SMTP"
         destination {
             port 25
         }
         protocol tcp
     }
     rule 53 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 80 {
         action accept
         description "Allow HTTP/HTTPS"
         destination {
             port 80,443
         }
         protocol tcp
     }
     rule 100 {
         action accept
         description "Allow PING"
         protocol icmp
     }
     rule 123 {
         action accept
         description "Allow NTP"
         destination {
             port 123
         }
         protocol udp
     }
     rule 2021 {
         action accept
         description "Allow FTP"
         destination {
             port 20,21
         }
         protocol tcp
     }
 }
 name WAN-GUEST {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
 }
 name WAN-LAN {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
 }
 name WAN-LOCAL {
     default-action drop
     rule 1 {
         action accept
         description "Allow established connections"
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         description "Drop invalid packets"
         state {
             invalid enable
         }
     }
     rule 6768 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
 }
 receive-redirects disable
 send-redirects enable
 source-validation disable
 syn-cookies enable

 

Alhought I'm able to ping the GUEST zone from the LAN and also able to ping my LAN from LOCAL. I'm not able to ping my GUEST network from LOCAL despite the allowance of ICMP on the firewall LOCAL-GUEST:

 

 rule 100 {
     action accept
     description "Allow PING"
     protocol icmp
 }

The tcpdump on one of of the hosts in the  GUEST network shows me that the echo request is arriving from the router and the host is replying with the echo reply as expected:

 

01:09:43.795723 IP 172.16.2.1 > 172.16.2.11: ICMP echo request, id 3331, seq 1, length 64
01:09:43.795920 IP 172.16.2.11 > 172.16.2.1: ICMP echo reply, id 3331, seq 1, length 64
01:09:44.799955 IP 172.16.2.1 > 172.16.2.11: ICMP echo request, id 3331, seq 2, length 64
01:09:44.800153 IP 172.16.2.11 > 172.16.2.1: ICMP echo reply, id 3331, seq 2, length 64

On the LOCAL (router) end when I ran the tcpdump I see that the echo reply is not reaching the router:

 

01:17:28.864902 IP 172.16.2.1 > 172.16.2.11: ICMP echo request, id 3789, seq 1, length 64
01:17:29.866648 IP 172.16.2.1 > 172.16.2.11: ICMP echo request, id 3789, seq 2, length 64
01:17:30.866650 IP 172.16.2.1 > 172.16.2.11: ICMP echo request, id 3789, seq 3, length 64

So I assume that probably a return path is needed from the GUEST-LOCAL policy, which made me add this config  to the policy

 

 rule 100 {
     action accept
     protocol icmp

However this hasn't produce any results. The reponse is still not reaching the router. The only other possible culprit is the UAP lite, but before I start to diagnose this I want to be sure that I'm not missing anything.

 

Is anyone able to confirm if that's the case?


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>