rawk stoan
Occasional Visitor
The router (running opnsense) I have been working on has four ports, WAN, LAN, and the last two ports are combined as a LAGG.
I have also created 3 VLANs to be tagged on the LAGG trunk. So my LAN port will be solely a management port, and LAGG is my trunk port to the switch.
I am having a hard time understanding different firewall rules. There are many online examples with firewall rules on the LAN and VLANs interfaces.
For example, it seems common to have rules to allow only specific DNS servers using both and "allow" rule and "block" rules in combination.
The allow rule specifies: interface - LAN, source address - ANY, source port - ANY, destination address - LAN ADDRESS, destination port - DNS
The block rule specifies: interface - LAN, source address - ANY, source port - ANY, destination address - ANY, destination port - DNS
Would I copy these rules to each of my interfaces, LAGG and VLANs?
I would then modify the interface, but should the destination address remain as the LAN ADDRESS for each interface, even though the LAN is not my trunk port?
For LAGG it would be:
The allow rule specifies: interface - LAGG, source address - ANY, source port - ANY, destination address - LAN ADDRESS, destination port - DNS
The block rule specifies: interface - LAGG, source address - ANY, source port - ANY, destination address - ANY, destination port - DNS
For VLAN 3 it would be:
The allow rule specifies: interface - VLAN3, source address - ANY, source port - ANY, destination address - LAN ADDRESS, destination port - DNS
The block rule specifies: interface - VLAN3, source address - ANY, source port - ANY, destination address - ANY, destination port - DNS
I assume the port is the physical port and address is an IP address, and in this application I find it confusing.
I have also created 3 VLANs to be tagged on the LAGG trunk. So my LAN port will be solely a management port, and LAGG is my trunk port to the switch.
I am having a hard time understanding different firewall rules. There are many online examples with firewall rules on the LAN and VLANs interfaces.
For example, it seems common to have rules to allow only specific DNS servers using both and "allow" rule and "block" rules in combination.
The allow rule specifies: interface - LAN, source address - ANY, source port - ANY, destination address - LAN ADDRESS, destination port - DNS
The block rule specifies: interface - LAN, source address - ANY, source port - ANY, destination address - ANY, destination port - DNS
Would I copy these rules to each of my interfaces, LAGG and VLANs?
I would then modify the interface, but should the destination address remain as the LAN ADDRESS for each interface, even though the LAN is not my trunk port?
For LAGG it would be:
The allow rule specifies: interface - LAGG, source address - ANY, source port - ANY, destination address - LAN ADDRESS, destination port - DNS
The block rule specifies: interface - LAGG, source address - ANY, source port - ANY, destination address - ANY, destination port - DNS
For VLAN 3 it would be:
The allow rule specifies: interface - VLAN3, source address - ANY, source port - ANY, destination address - LAN ADDRESS, destination port - DNS
The block rule specifies: interface - VLAN3, source address - ANY, source port - ANY, destination address - ANY, destination port - DNS
I assume the port is the physical port and address is an IP address, and in this application I find it confusing.