Changes

no edit summary
Line 1: Line 1:  +
<p style="color:red">The information in this page is updated in accordance with firmware version '''[https://wiki.teltonika-networks.com/view/FW_%26_SDK_Downloads 00.07.09.01]'''.
 +
 
==Introduction==
 
==Introduction==
    
In this example we will show how to manage VLAN to VLAN communication with either '''one''' firewall zone or '''multiple''' firewall zones.  
 
In this example we will show how to manage VLAN to VLAN communication with either '''one''' firewall zone or '''multiple''' firewall zones.  
   −
If you're having trouble finding any page or some of the parameters described here on your device's WebUI, you should turn on '''"Advanced WebUI"''' mode. You can do that by clicking the '''"Basic"''' button under '''"Mode"''' which is located at the top-right corner of the WebUI.
+
If you're having trouble finding any page or some of the parameters described here on your device's WebUI, you should turn on '''"Advanced WebUI"''' mode. You can do that by clicking the '''"Advanced"''' button which is located at the top-right corner of the WebUI.
[[File:Basic WebUI Advanced.gif|border|class=tlt-border|1004x1004px]]
+
[[File:Networking rutos manual webui basic advanced mode 75.gif|border|class=tlt-border|1004x1004px]]
    
==Setting up VLANs==
 
==Setting up VLANs==
Line 15: Line 17:  
Created VLANs in the WebUI should look similar to this:
 
Created VLANs in the WebUI should look similar to this:
   −
[[File:3vlansforintervlan.png|border|class=tlt-border|]]
+
[[File:3vlansforintervlansv2.png|border|class=tlt-border]]
    
==VLAN to VLAN communication with one firewall zone==
 
==VLAN to VLAN communication with one firewall zone==
 +
 +
Once VLANs are created - they lay under one firewall zone, here is a Topology of the network and the zone which covers all 3 of VLANs:
 +
 +
[[File:Topo one zone vlans.jpg|600px|border|class=tlt-border]]
    
Initially, when we create VLAN interfaces, all VLANs are able to communicate with each other, for example pinging from lan to lan2:
 
Initially, when we create VLAN interfaces, all VLANs are able to communicate with each other, for example pinging from lan to lan2:
Line 23: Line 29:  
[[File:Allowlan1tolan2pingoriginal.png|border|class=tlt-border|]]
 
[[File:Allowlan1tolan2pingoriginal.png|border|class=tlt-border|]]
   −
To disable VLAN to VLAN communication, navigate to '''Network -> Firewall -> General Settings'''. Press '''Edit''' on the '''LAN''' zone (lan -> wan), click on '''Forward''' and select '''Drop or Reject'''. Make sure that all created VLANs are added in the Covered networks tab:
+
To disable VLAN to VLAN communication, navigate to '''Network -> Firewall -> General Settings'''. Press '''Edit''' on the '''LAN''' zone (lan -> wan).
 +
 
 +
[[File:Lan zone edit.png|border|1100px|class=tlt-border|]]
   −
[[File:Disablevlantovlandefault.png|border|class=tlt-border|]]
+
Click on '''Forward''' and select '''Drop or Reject'''. Make sure that all created VLANs are added in the Covered networks tab:
 +
 
 +
[[File:Disablevlantovlandefaultv2.png|border|class=tlt-border|]]
    
Now if we try to reach lan2 from lan, the devices are not able to communicate:
 
Now if we try to reach lan2 from lan, the devices are not able to communicate:
Line 33: Line 43:  
==VLAN to VLAN communication with inter-zone forwarding==
 
==VLAN to VLAN communication with inter-zone forwarding==
   −
In order to get more control over VLANs, an '''inter-zone''' forwarding functionality should be used. To start with, we will need to create new firewall zones: LAN1, LAN2 and LAN3. To add new zones, navigate to '''Network -> Firewall -> General Settings'''. In the Zones section, press ADD button to add a new zone.
+
In order to get more control over VLANs, an '''inter-zone''' forwarding functionality should be used. Here is a network topology with firewall zones and an explanation.
   −
[[File:Addnewfwzone1.png|border|1000px|class=tlt-border|]]
+
[[File:3zonetopology.png|600px|border|class=tlt-border]]
   −
A new window will open, there configure the settings according to the points below and press Save & Apply.:
+
To start with, we will need to create new firewall zones: LAN1, LAN2 and LAN3. To add new zones, navigate to '''Network -> Firewall -> General Settings'''. In the Zones section, press [[File:Add Button.png|60x90px]] to add a new zone.
   −
* Name: lan1
+
[[File:Addnewfwzone1v1.png|border|1100px|class=tlt-border|]]
* Input: Accept
  −
* Output: Accept
  −
* Forward: Reject
  −
* Covered networks: lan
     −
We set up Input and Output zone settings as Accept, this allows traffic to leave and reach this zone. Forward: Reject acts as a default policy - we modify this one via Inter-zone forwarding section.
+
A new window will open, there configure the settings according to the points below and press [[File:Save & Apply.png|100x30px]].:
 +
<table class="nd-othertables_2">
 +
<tr>
 +
<th width=400; style="border-bottom: 1px solid white;></th>
 +
<th width=600; style="border-bottom: 1px solid white"; rowspan=2>[[File:Lan1zonesettingsv2.png|border|class=tlt-border|right]]</th>
 +
</tr>
 +
<tr>
 +
<td style="border-bottom: 4px solid white>
 +
# Name: '''Enter desired name'''
 +
# Input: '''Accept'''
 +
# Output: '''Accept'''
 +
# Forward: '''Reject'''
 +
# Covered networks: '''lan'''
 +
</td>
 +
</tr>
 +
</table>
 +
'''Note''': By setting the Input and Output zones to '''Accept''' traffic is allowed to enter and leave the zone. '''Forward: Reject''' blocks communication between zones - this is a default policy. '''Inter-zone forwarding''' section can be used to modify the default behavior of the Forward zone and allow communication between zones.
   −
[[File:Lan1zonesettings.png|border|class=tlt-border|]]
+
----
   −
----
+
Follow the same steps to create Firewall Zones '''lan2''' and '''lan3'''.
   −
Follow the same steps to create Firewall Zones '''lan2''' and '''lan3'''. '''Lan2''' zone settings:
+
'''lan2''' zone settings:
   −
* Name: lan2
+
* Name: '''Enter desired name'''
* Input: Accept
+
* Input: '''Accept'''
* Output: Accept
+
* Output: '''Accept'''
* Forward: Reject
+
* Forward: '''Reject'''
* Covered networks: lan2
+
* Covered networks: '''lan2'''
   −
'''Lan3''' zone settings:
+
'''lan3''' zone settings:
   −
* Name: lan3
+
* Name: '''Enter desired name'''
* Input: Accept
+
* Input: '''Accept'''
* Output: Accept
+
* Output: '''Accept'''
* Forward: Reject
+
* Forward: '''Reject'''
* Covered networks: lan3
+
* Covered networks: '''lan3'''
    
Newly created firewall zones should look like this:
 
Newly created firewall zones should look like this:
   −
[[File:Newlycreatedfirewallzones.png|border|1000px|class=tlt-border|]]
+
[[File:Newlycreatedfirewallzonesv2.png|border|1100px|class=tlt-border|]]
 
  −
----
  −
 
  −
Now, to attach these zones to the corresponding interfaces, we need to go back to the Network Interfaces tab ('''Network -> Interfaces -> General'''). Click edit on the lan interface and navigate to Firewall settings. In Create / Assign firewall-zone section, select lan1:
  −
 
  −
[[File:Interfacesfireewallsettings.png|border|class=tlt-border|]]
     −
Follow these steps to attach the corresponding zone to the interfaces:
  −
* lan2 interface – firewall zone lan2
  −
* lan3 interface – firewall zone lan3
      
==Inter-zone forwarding use examples==
 
==Inter-zone forwarding use examples==
Line 88: Line 101:     
Example: '''lan1''' wants to communicate only with '''lan2''':
 
Example: '''lan1''' wants to communicate only with '''lan2''':
* lan1 settings: allow forward to destination zones: lan2
+
<table class="nd-othertables_2">
* lan1 settings: allow forward from source zones: lan2
+
<tr>
* No need to change settings for the lan2 zone
+
<th width=400; style="border-bottom: 1px solid white;></th>
 +
<th width=600; style="border-bottom: 1px solid white"; rowspan=2>[[File:Interzoneforwarding.png|border|class=tlt-border|right]]</th>
 +
</tr>
 +
<tr>
 +
<td style="border-bottom: 4px solid white>
 +
'''lan1''' settings:  
 +
* allow forward to destination zones: '''lan2'''
 +
* allow forward from source zones: '''lan2'''
 +
'''No need to change''' settings for the '''lan2''' zone
 +
</td>
 +
</tr>
 +
</table>
    
If '''lan1''' to '''lan2''' communication is allowed, zone settings should look like this:
 
If '''lan1''' to '''lan2''' communication is allowed, zone settings should look like this:
   −
[[File:2022-12-14 12-52 lan1 and lan2.png|border|class=tlt-border|]]
+
[[File:Lan1tolan2.png|border|class=tlt-border|]]
    
Testing the communication between '''lan1''' and '''lan2''':
 
Testing the communication between '''lan1''' and '''lan2''':
Line 107: Line 131:     
To reach '''lan3''' from '''lan1''', edit '''lan3''' zone accordingly:
 
To reach '''lan3''' from '''lan1''', edit '''lan3''' zone accordingly:
* allow forward to destination zones: lan1
+
* allow forward to destination zones: '''lan1'''
* allow forward from source zones: lan1
+
* allow forward from source zones: '''lan1'''
    
Zone settings after these changes should look like this:
 
Zone settings after these changes should look like this:
   −
[[File:2022-12-14 12-57 zones after changes.png|border|class=tlt-border|]]
+
[[File:Zonesfterchanges.png|border|class=tlt-border|]]
    
Now the communication between '''lan1''' and '''lan3''' works:
 
Now the communication between '''lan1''' and '''lan3''' works:
Line 119: Line 143:     
Using these examples as a base, you can allow / reject VLAN to VLAN communication between different VLANs according to your needs.
 
Using these examples as a base, you can allow / reject VLAN to VLAN communication between different VLANs according to your needs.
 +
[[Category:Router control and monitoring]]

Navigation menu