Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Firewall help - block VLANs from accessing admin network

$
0
0

Got another question for you guys!

 

I've managed to create 3 VLANs and prevent them from communicating with each other but still keeping internet access. I'm struggling to figure out how to stop them from accessing my 192.168.1.0/24 network however (where the management interface resides). Basically, I don't want users on these VLANs to be able to log in to the Edgerouter or anything else on the same network as the Edgerouter.

 

I tried adding a specific rule in the VLAN_IN firewall group, to drop packets going to 192.168.1.0/24 and then another for the specific 192.168.1.100 IP address, but that didn't work and clients on the VLANs were able to access 192.168.1.100 Man Sad

 

Any suggestions?

 

Full configuration is below:

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group ROUTER_IP {
            address 192.168.8.9
            address 192.168.16.17
            address 192.168.24.25
        }
        network-group VLAN_NETS {
            network 192.168.8.8/29
            network 192.168.16.16/29
            network 192.168.24.24/29
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name VLAN_IN {
        default-action accept
        rule 10 {
            action accept
            destination {
                group {
                    address-group ROUTER_IP
                }
            }
        }
        rule 20 {
            action drop
            destination {
                group {
                    network-group VLAN_NETS
                }
            }
        }
    }
    options {
        mss-clamp {
            mss 1492
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.1.100/24
        duplex auto
        speed auto
    }
    ethernet eth1 {
        duplex auto
        speed auto
        vif 20 {
            address 192.168.8.9/29
            description mate
            firewall {
                in {
                    name VLAN_IN
                }
            }
        }
        vif 30 {
            address 192.168.16.17/29
            description tpg
            firewall {
                in {
                    name VLAN_IN
                }
            }
        }
        vif 40 {
            address 192.168.24.25/29
            description skymesh
            firewall {
                in {
                    name VLAN_IN
                }
            }
        }
    }
    ethernet eth2 {
        duplex auto
        pppoe 0 {
            default-route auto
            mtu 1492
            name-server auto
            password ****************
            user-id ****************
        }
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        mtu 1500
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name mate {
            authoritative disable
            subnet 192.168.8.8/29 {
                default-router 192.168.8.9
                dns-server 192.168.8.9
                lease 86400
                start 192.168.8.10 {
                    stop 192.168.8.14
                }
            }
        }
        shared-network-name skymesh {
            authoritative disable
            subnet 192.168.24.24/29 {
                default-router 192.168.24.25
                dns-server 192.168.24.25
                lease 86400
                start 192.168.24.26 {
                    stop 192.168.24.30
                }
            }
        }
        shared-network-name tpg {
            authoritative disable
            subnet 192.168.16.16/29 {
                default-router 192.168.16.17
                dns-server 192.168.16.17
                lease 86400
                start 192.168.16.18 {
                    stop 192.168.16.22
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1.20
            listen-on eth1.30
            listen-on eth1.40
        }
    }
    gui {
        http-port 80
        https-port 443
        listen-address 192.168.1.100
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description mate
            log disable
            outbound-interface pppoe0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name ubnt
    login {
        user ubnt {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>