Thanks dpurgert,
Thats exactly what I thought, but when I do that, no traffic is able to go through at all.
Here is the config:
name GUEST_VLAN_IN {default-action reject description "PACKETS COMING THRU TO THE VLAN" rule 10 {action accept description "ALLOW ESTABLISHED/RELATED" log disable protocol all state { established enable invalid disable new disable related enable } } rule 40 {action accept description "ALLOW HTTP" destination {port 80 } log disable protocol tcp_udp state { established enable invalid disable new enable related enable } } rule 50 { action accept description "ALLOW HTTPS" destination { port 443 } log disable protocol tcp_udp state { established enable invalid disable new disable related enable } } rule 60 { action accept description "ALLOW UNIFI PORTAL" destination { group { address-group unifi-portal-access } } log disable protocol tcp } } name GUEST_VLAN_LOCAL { default-action drop description "DEVICE TO ROUTER ACCESS" rule 1 { action accept description "ALLOW DHCP" destination { port 67 } log disable protocol tcp_udp } rule 2 { action accept description "ALLOW DNS" destination { port 53 } log disable protocol udp } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth1 { address 192.168.199.1/24 description Local duplex auto poe { output 48v } speed auto vif 30 { address 10.10.30.1/24 description "Guest VLAN" firewall { in { name GUEST_VLAN_IN } local { name GUEST_VLAN_LOCAL } } mtu 1500 } } ethernet eth2 { description "Local 2" duplex auto poe { output off } speed auto } ethernet eth3 { description "Local 2" duplex auto poe { output off } speed auto } ethernet eth4 { description "Local 2" duplex auto poe { output off } speed auto } loopback lo { } switch switch0 { address 192.168.200.1/24 description "Local 2" mtu 1500 switch-port { interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } }
That stil doesn't work