Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: ER-8 with 1.8.5: Hairpin with Isolated VLANs - Help Please!

$
0
0

16again wrote:

Ditch the red rules.

For each portmapping , add a rule allowing it to <IFACE>_IN ruleset.

Note: destination address/port are local addresses, even when client is connecting to WAN IP.  Make sure the allow rule is above "DROP LAN" rules. 


Can you please clarify this? I am having the same problem: I've set up two VLANs on switch0 and created the various firewall rules to keep them isolated. This seems to be working fine, except for the loopback/hairpin. I would like devices on the guest/IoT networks to be able to hit internal services via the WAN IP (and port forwarding).

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group GUEST_NETWORKS {
            description "Guest Networks"
            network 192.168.5.0/24
        }
        network-group IOT_NETWORKS {
            description "IoT Networks"
            network 192.168.10.0/24
        }
        network-group LAN_NETWORKS {
            description "Local Networks"
            network 192.168.1.0/24
        }
        port-group PORT_FORWARDS {
            description "Port Forwards for Loopback"
            port 25
            port 80
            port 443
            port 45634
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name ISOLATE_GUEST_VLAN_IN {
        default-action accept
        description "Isolate Guest (VLAN5) - inbound"
        rule 10 {
            action accept
            description "Accept Established/Related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action accept
            description "Allow Loopback"
            destination {
                address 192.168.1.61
                group {
                    port-group PORT_FORWARDS
                }
            }
            log disable
            protocol all
        }
        rule 30 {
            action drop
            description "Isolate from LAN"
            destination {
                group {
                    network-group LAN_NETWORKS
                }
            }
            log disable
            protocol all
        }
        rule 40 {
            action drop
            description "Isolate from IoT VLAN"
            destination {
                group {
                    network-group IOT_NETWORKS
                }
            }
            log disable
            protocol all
        }
    }
    name ISOLATE_GUEST_VLAN_LOCAL {
        default-action drop
        description "Isolate Guest (VLAN5) - local"
        rule 1 {
            action accept
            description "Accept DNS"
            destination {
                port 53
            }
            log disable
            protocol udp
        }
        rule 2 {
            action accept
            description "Accept DHCP"
            destination {
                port 67
            }
            log disable
            protocol udp
        }
    }
    name ISOLATE_IOT_VLAN_IN {
        default-action accept
        description "Isolate IoT (VLAN10) - inbound"
        rule 10 {
            action accept
            description "Accept Established/Related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action accept
            description "Allow Loopback"
            destination {
                address 192.168.1.61
                group {
                    port-group PORT_FORWARDS
                }
            }
            log disable
            protocol all
        }
        rule 30 {
            action drop
            description "Isolate from LAN"
            destination {
                group {
                    network-group LAN_NETWORKS
                }
            }
            log disable
            protocol all
        }
        rule 40 {
            action drop
            description "Isolate from Guest VLAN"
            destination {
                group {
                    network-group GUEST_NETWORKS
                }
            }
            log disable
            protocol all
        }
    }
    name ISOLATE_IOT_VLAN_LOCAL {
        default-action drop
        description "Isolate IoT (VLAN10) - local"
        rule 1 {
            action accept
            description "Accept DNS"
            destination {
                port 53
            }
            log disable
            protocol udp
        }
        rule 2 {
            action accept
            description "Accept DHCP"
            destination {
                port 67
            }
            log disable
            protocol udp
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description "Allow PPTP Port 1723"
            destination {
                port 1723
            }
            log disable
            protocol tcp
        }
        rule 30 {
            action accept
            description "Allow PPTP GRE"
            log disable
            protocol gre
        }
        rule 40 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description "cable modem"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        description "Z-Wave router"
        duplex auto
        speed auto
    }
    ethernet eth2 {
        description "PoE switch"
        duplex auto
        speed auto
    }
    ethernet eth3 {
        description "Linux server"
        duplex auto
        speed auto
    }
    ethernet eth4 {
        description "UniFi AP"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.1.1/24
        description Local
        mtu 1500
        switch-port {
            interface eth1 {
                vlan {
                    pvid 10
                }
            }
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
                vlan {
                    vid 5
                    vid 10
                }
            }
            vlan-aware enable
        }
        vif 5 {
            address 192.168.5.1/24
            description Guests
            firewall {
                in {
                    name ISOLATE_GUEST_VLAN_IN
                }
                local {
                    name ISOLATE_GUEST_VLAN_LOCAL
                }
            }
            mtu 1500
        }
        vif 10 {
            address 192.168.10.1/24
            description IoT
            firewall {
                in {
                    name ISOLATE_IOT_VLAN_IN
                }
                local {
                    name ISOLATE_IOT_VLAN_LOCAL
                }
            }
            mtu 1500
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface switch0
    lan-interface switch0.5
    lan-interface switch0.10
    rule 1 {
        description Apache
        forward-to {
            address 192.168.1.61
            port 8225
        }
        original-port 80
        protocol tcp
    }
    rule 2 {
        description "Apache SSL"
        forward-to {
            address 192.168.1.61
            port 443
        }
        original-port 443
        protocol tcp
    }
    rule 3 {
        description SMTP
        forward-to {
            address 192.168.1.61
            port 25
        }
        original-port 25
        protocol tcp
    }
    rule 4 {
        description Plex
        forward-to {
            address 192.168.1.61
            port 32400
        }
        original-port 45634
        protocol tcp
    }
    wan-interface eth0
}
protocols {
    static {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name Guests {
            authoritative disable
            subnet 192.168.5.0/24 {
                default-router 192.168.5.1
                dns-server 192.168.5.1
                lease 14400
                start 192.168.5.101 {
                    stop 192.168.5.110
                }
            }
        }
        shared-network-name Home {
            authoritative disable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 192.168.1.66
                dns-server 65.32.5.112
                lease 86400
                start 192.168.1.101 {
                    stop 192.168.1.130
                }
                unifi-controller 192.168.1.61
            }
        }
        shared-network-name IoT {
            authoritative disable
            subnet 192.168.10.0/24 {
                default-router 192.168.10.1
                dns-server 192.168.10.1
                lease 86400
                start 192.168.10.101 {
                    stop 192.168.10.110
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface eth0 {
                service dyndns {
                    host-name <removed>
                    login <removed>
                    password <removed>
                }
            }
        }
        forwarding {
            cache-size 150
            listen-on switch0
            listen-on switch0.5
            listen-on switch0.10
        }
    }
    gui {
        http-port 80
        https-port 443
        listen-address 192.168.1.1
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    snmp {
        community public {
            authorization ro
        }
        contact <removed>
        location closet
    }
    ssh {
        listen-address 192.168.1.1
        port 22
        protocol-version v2
    }
    ubnt-discover {
        disable
    }
}
system {
    host-name EdgeRouterX
    login {
        user ubnt {
            authentication {
                encrypted-password <removed>
                plaintext-password ""
            }
            full-name admin
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/New_York
}
vpn {
    pptp {
        remote-access {
            authentication {
                local-users {
                    username <removed> {
                        password <removed>
                    }
                }
                mode local
            }
            client-ip-pool {
                start 192.168.1.200
                stop 192.168.1.210
            }
            mtu 1492
        }
    }
}

Even if I drop Rule 30 (which prevents access to the 192.168.1.0/24 network) in both ISOLATE_<x>_VLAN_IN rulesets, the loopback isn't working. I tried adding the loopback rules in the OP but that didn't help. Loopback for devices already on the 192.168.1.0/24 network is working fine.

 

Am I missing something obvious? Thanks!


Viewing all articles
Browse latest Browse all 60861

Trending Articles