Edge Router X – 1 WAN 1 IoT LAN & 3 Protected LANs Setup

Network

Edge Router X – 1 WAN, 1 IoT LAN & 3 Protected LANs Setup

This assumes the WAN+2LAN2 Setup Wizard was used.
Then customomized as per the Sample Configuration table below. (WAN_IN & WAN_LOCAL Firewall Policies exist)

Sample Configuration

InterfaceDescriptionNetworkVLAN
eth0ISPDHCP2
eth1IoT (Untrusted/Contained)192.168.10.0/2410
eth2Protected Network 20192.168.20.0/2420
eth3Protected Network 30192.168.30.0/2430
eth4Protected Network 40192.168.40.0/2440

Firewall NAT Groups

PROTECTED_NETWORKS

Firewall/NAT>Firewall/Nat Groups>+Add Group>

Name: PROTECTED_NETWORKS
Description: Protected Networks
Group Type: Network Group
[Save]

PROTECTED_NETWORKS>Actions>Configure

  • Network: 192.168.20.0/24
  • Network: 192.168.30.0/24
  • Network: 192.168.40.0/24
    [Save]

Firewall Policies

Ruleset: BLOCK_IN

FIrewall/NAT>Firewall Policies>+Add Ruleset>

Name: BLOCK_IN
Description: Block In
Default Action: Accept
[Save]

Firewall/NAT>Firewall Policies>BLOCK_IN>Actions>Edit Ruleset>

Interfaces:
Interface: eth1
Direction: in
[Save Ruleset]

Firewall/NAT>Firewall Policies>BLOCK_IN>Edit Ruleset>Rules>Add New Rule>

Basic
Description: Accept Established/Related
Action: Accept
Protocol: All Protocols
Advanced:
State: Established, Related
[Save]

Rule: Drop PROTECTED_NETWORKS

Firewall/NAT>Firewall Policies>BLOCK_IN>Edit Ruleset>Rules>Add New Rule>

Basic
Description: Drop PROTECTED_NETWORKS
Action: Drop
Protocol: All Protocols
Destination :
Network Group : Protected Networks

Ruleset: BLOCK_LOCAL

FIrewall/NAT>Firewall Policies>+Add Ruleset>

Name: BLOCK_LOCAL
Description: Block Local
[Save]

Firewall/NAT>Firewall Policies>BLOCK_LOCAL>Actions>Edit Ruleset>

Interfaces:
Interface: eth1
Direction: local
[Save Ruleset]

Firewall/NAT>Firewall Policies>BLOCK_LOCAL>Actions>Edit Ruleset>

Rule: Accept DNS

Firewall/NAT>Firewall Policies>BLOCK_LOCAL>Edit Ruleset>Rules>Add New Rule>

Basic:
Description: Accept DNS
Action: Accept
Protocol: UDP
Destination:
Port: 53
[Save]

Rule: Accept DHCP

Firewall/NAT>Firewall Policies>BLOCK_LOCAL>Edit Ruleset>Rules>Add New Rule>

Basic:
Description: Accept DHCP
Action: Accept
Protocol: UDP
Destination:
Port: 67
[Save]

CLI

configure
set firewall group network-group PROTECTED_NETWORKS
set firewall group network-group PROTECTED_NETWORKS description “Protected Networks”
set firewall group network-group PROTECTED_NETWORKS network 192.168.20.0/24
set firewall group network-group PROTECTED_NETWORKS network 192.168.30.0/24
set firewall group network-group PROTECTED_NETWORKS network 192.168.40.0/24
set firewall name BLOCK_IN
set firewall name BLOCK_IN default-action accept
set firewall name BLOCK_IN rule 10 action accept
set firewall name BLOCK_IN rule 10 description “Accept Established/Related”
set firewall name BLOCK_IN rule 10 protocol all
set firewall name BLOCK_IN rule 10 state established enable
set firewall name BLOCK_IN rule 10 state related enable
set firewall name BLOCK_IN rule 20 action drop
set firewall name BLOCK_IN rule 20 description “Drop PROTECTED_NETWORKS”
set firewall name BLOCK_IN rule 20 destination group network-group PROTECTED_NETWORKS
set firewall name BLOCK_IN rule 20 protocol all
set firewall name BLOCK_LOCAL
set firewall name BLOCK_LOCAL default-action drop
set firewall name BLOCK_LOCAL rule 10 action accept
set firewall name BLOCK_LOCAL rule 10 description “Accept DNS”
set firewall name BLOCK_LOCAL rule 10 destination port 53
set firewall name BLOCK_LOCAL rule 10 protocol udp
set firewall name BLOCK_LOCAL rule 20 action accept
set firewall name BLOCK_LOCAL rule 20 description “Accept DHCP”
set firewall name BLOCK_LOCAL rule 20 destination port 67
set firewall name BLOCK_LOCAL rule 20 protocol udp
commit
set interfaces ethernet eth1 firewall in name BLOCK_IN
set interfaces ethernet eth1 firewall local name BLOCK_LOCAL
commit
save
exit

Related

Links

  • https://www.ui.com/edgemax/edgerouter-x/
,