16again wrote:Ditch the red rules.
For each portmapping , add a rule allowing it to <IFACE>_IN ruleset.
Note: destination address/port are local addresses, even when client is connecting to WAN IP. Make sure the allow rule is above "DROP LAN" rules.
Can you please clarify this? I am having the same problem: I've set up two VLANs on switch0 and created the various firewall rules to keep them isolated. This seems to be working fine, except for the loopback/hairpin. I would like devices on the guest/IoT networks to be able to hit internal services via the WAN IP (and port forwarding).
firewall { all-ping enable broadcast-ping disable group { network-group GUEST_NETWORKS { description "Guest Networks" network 192.168.5.0/24 } network-group IOT_NETWORKS { description "IoT Networks" network 192.168.10.0/24 } network-group LAN_NETWORKS { description "Local Networks" network 192.168.1.0/24 } port-group PORT_FORWARDS { description "Port Forwards for Loopback" port 25 port 80 port 443 port 45634 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name ISOLATE_GUEST_VLAN_IN { default-action accept description "Isolate Guest (VLAN5) - inbound" rule 10 { action accept description "Accept Established/Related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 20 { action accept description "Allow Loopback" destination { address 192.168.1.61 group { port-group PORT_FORWARDS } } log disable protocol all } rule 30 { action drop description "Isolate from LAN" destination { group { network-group LAN_NETWORKS } } log disable protocol all } rule 40 { action drop description "Isolate from IoT VLAN" destination { group { network-group IOT_NETWORKS } } log disable protocol all } } name ISOLATE_GUEST_VLAN_LOCAL { default-action drop description "Isolate Guest (VLAN5) - local" rule 1 { action accept description "Accept DNS" destination { port 53 } log disable protocol udp } rule 2 { action accept description "Accept DHCP" destination { port 67 } log disable protocol udp } } name ISOLATE_IOT_VLAN_IN { default-action accept description "Isolate IoT (VLAN10) - inbound" rule 10 { action accept description "Accept Established/Related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 20 { action accept description "Allow Loopback" destination { address 192.168.1.61 group { port-group PORT_FORWARDS } } log disable protocol all } rule 30 { action drop description "Isolate from LAN" destination { group { network-group LAN_NETWORKS } } log disable protocol all } rule 40 { action drop description "Isolate from Guest VLAN" destination { group { network-group GUEST_NETWORKS } } log disable protocol all } } name ISOLATE_IOT_VLAN_LOCAL { default-action drop description "Isolate IoT (VLAN10) - local" rule 1 { action accept description "Accept DNS" destination { port 53 } log disable protocol udp } rule 2 { action accept description "Accept DHCP" destination { port 67 } log disable protocol udp } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description "Allow PPTP Port 1723" destination { port 1723 } log disable protocol tcp } rule 30 { action accept description "Allow PPTP GRE" log disable protocol gre } rule 40 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description "cable modem" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { description "Z-Wave router" duplex auto speed auto } ethernet eth2 { description "PoE switch" duplex auto speed auto } ethernet eth3 { description "Linux server" duplex auto speed auto } ethernet eth4 { description "UniFi AP" duplex auto poe { output off } speed auto } loopback lo { } switch switch0 { address 192.168.1.1/24 description Local mtu 1500 switch-port { interface eth1 { vlan { pvid 10 } } interface eth2 { } interface eth3 { } interface eth4 { vlan { vid 5 vid 10 } } vlan-aware enable } vif 5 { address 192.168.5.1/24 description Guests firewall { in { name ISOLATE_GUEST_VLAN_IN } local { name ISOLATE_GUEST_VLAN_LOCAL } } mtu 1500 } vif 10 { address 192.168.10.1/24 description IoT firewall { in { name ISOLATE_IOT_VLAN_IN } local { name ISOLATE_IOT_VLAN_LOCAL } } mtu 1500 } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface switch0 lan-interface switch0.5 lan-interface switch0.10 rule 1 { description Apache forward-to { address 192.168.1.61 port 8225 } original-port 80 protocol tcp } rule 2 { description "Apache SSL" forward-to { address 192.168.1.61 port 443 } original-port 443 protocol tcp } rule 3 { description SMTP forward-to { address 192.168.1.61 port 25 } original-port 25 protocol tcp } rule 4 { description Plex forward-to { address 192.168.1.61 port 32400 } original-port 45634 protocol tcp } wan-interface eth0 } protocols { static { } } service { dhcp-server { disabled false hostfile-update disable shared-network-name Guests { authoritative disable subnet 192.168.5.0/24 { default-router 192.168.5.1 dns-server 192.168.5.1 lease 14400 start 192.168.5.101 { stop 192.168.5.110 } } } shared-network-name Home { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.66 dns-server 65.32.5.112 lease 86400 start 192.168.1.101 { stop 192.168.1.130 } unifi-controller 192.168.1.61 } } shared-network-name IoT { authoritative disable subnet 192.168.10.0/24 { default-router 192.168.10.1 dns-server 192.168.10.1 lease 86400 start 192.168.10.101 { stop 192.168.10.110 } } } use-dnsmasq disable } dns { dynamic { interface eth0 { service dyndns { host-name <removed> login <removed> password <removed> } } } forwarding { cache-size 150 listen-on switch0 listen-on switch0.5 listen-on switch0.10 } } gui { http-port 80 https-port 443 listen-address 192.168.1.1 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } snmp { community public { authorization ro } contact <removed> location closet } ssh { listen-address 192.168.1.1 port 22 protocol-version v2 } ubnt-discover { disable } } system { host-name EdgeRouterX login { user ubnt { authentication { encrypted-password <removed> plaintext-password "" } full-name admin level admin } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/New_York } vpn { pptp { remote-access { authentication { local-users { username <removed> { password <removed> } } mode local } client-ip-pool { start 192.168.1.200 stop 192.168.1.210 } mtu 1492 } } }
Even if I drop Rule 30 (which prevents access to the 192.168.1.0/24 network) in both ISOLATE_<x>_VLAN_IN rulesets, the loopback isn't working. I tried adding the loopback rules in the OP but that didn't help. Loopback for devices already on the 192.168.1.0/24 network is working fine.
Am I missing something obvious? Thanks!