Please keep discussion responses in separate bins for clearer consumption
SECTION 1 DISCUSSION
Here is my FW rule grouping as it stand now.
So far I have been unable to block anything from the HOMELAN to HEX Router or HEX LAN, let alone block WINBOX.
The only connectivity I want from HOMELAN to the HEX side is my PC on the HOMELAN 192.168.0.xx, to reach the WINBOX at 192.168.88.1 via port 8291.
Explained
INPUT
0. passthrough forward rule (not listed below) - special dummy rule to show fast track counters
- drop anything from blacklist (combines 3 lists)
- drop anything from bad countries.
(I gather the intent here is to prevent even scanning leakage??, same with 3)
3.4. A pair of bizarre telnet rules, apparently the second rule generates a firewall address list that the first rule then uses. From a reliable source, I just don’t understand it LOL, other than i probably detects port scans on telnet port and put them into a portscan list (I just looked and yup one is there) which populates a list that is read by the first rule for the next session, further it keeps the list for xx amount of days and then old dates fall off.
- Drop rule for any invalid connection state traffic - not quite sure what this means but sounds good.
- Accept ICMP
- Accept valid traffic - (established,related, untracked" connection-state=established,related,untracked)??
- Drop all traffic not coming from the LAN?
What exactly are 7,8 saying in laymans terms. Assuming 7 is saying, hey this return traffic is legit because it originated from behind the router, ie from the LAN? Assuming 8 is saying, this is traffic that is attempting to get into the router but didnt result from originating on the LAN??
What is the difference between 5 and 8??
FORWARD
0. fasstrack forward rule
- Forward Valid outgoing traffic leaving LAN?? (accept established,related, untracked" connection-state=established,related,untracked)
- forward vpn incoming to lan
- forward vpn outgoing from lan
- Do not forward send any invalid connection state traffic
- Do Not Understand?
- Do Not Understand?
I am thinking that there is a relationship between 5 and 7,8 above in input???
7 - other rules on blocking protocols and SSH details…
/ip firewall filter
add action=drop chain=input comment="blacklist block (adverts, roguedom, malware) " in-interface=Eastlink src-address-list=blacklist
add action=drop chain=input comment="Country Block" in-interface=Eastlink src-address-list=CountryBlock
add action=drop chain=input comment="INPUT Drop port scanners - TELNET" in-interface=Eastlink src-address-list="Port Scanners"
add action=add-src-to-address-list address-list="Port Scanners" address-list-timeout=2d chain=input comment="INPUT Telnet Port Scans" \
dst-port=23 in-interface=Eastlink protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid log-prefix="invalid connection"
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log-prefix="invalid connection"
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new \
in-interface=Eastlink in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh port=xxxx :-)
set api disabled=yes
set api-ssl disabled=yes
/ip ssh
set strong-crypto=yes
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SECTION 2 DISCUSSION
Houston I have a problem. After you have managed to make sense of the above…
A PC on my homelan, downstairs, was not able to print to my homelan printer. Family member cheesed off.
I discovered why, it had acquired a HEX LAN IP address!!
ONLY possible because I have AP/switch in my room plugged into ether4 of the HEx router and my pc plugged into Ether3 (to access HOMELAN myself).
Somehow the slippery hex monster flexed its tentacles out onto the HOMELAN and invaded my homeland (and homelan LOL).
THis has to stop!!
Suggestions?
Okay, I re-created a separate bridge on the HEX, put ether3 and 4 on the different bridge and this effectively stopped comms between the two LANS. Great but not what I want.
So if they have to be on the same bridge for my PC to access the HOMELAN and yet access the HEX via WINBOX - what are my options?
after reading there may be three
a. USE FW rule maybe - use-ip-firewall (yes | no; Default: no) Force bridged traffic to also be processed by prerouting, forward and postrouting sections of IP routing (Packet Flow). This does not apply to routed traffic.
If the above means I can stop interLAN traffic great but it doesnt appear to be the case.
b. USE HORIZONS, not sure how this feature works and if its applicable in this case.
c. use other PORT submenu options, STP etc, no discovery and others may hold some promise.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SECTION 3 DISCUSSION
Okay now I am thinking that there is no way to do this except going the other way, ie external…
on my WINBOX I would type in the public IP of the HEX ROuter?
Setting up a fw rule on the HEX ROUTER with following logic,
WAN to HEX LAN rule.
PUBLIC IP Of zyxel router ALLOW
Service port 8291 ALLOW
(protocol tcp? udp?)
Destination HEX LAN
(or should I specificy the gateway address192.168.88.1??)
The only question is do I have the service right? Yes its port 8291 but its probably encrypted in some fashion so not sure what I would do with a firewall rule to cover that as well?
In other words If I want to manage the hEX from my homelan the only way to do it is go external to the WAN and back in so to speak.
That there is no way with all the POWER of this hex router (which is seeming more like a POS every day) to do otherwise???