Temat: Blokada strony webadmin dla wybranych VLAN
Witam,
Mam ustawione 3 VLANy wg schematu, który znalazłem w jednym z postów na forum.
VLAN 10 192.168.10.2/24 - o nazwie "man", który powinien mi dać dostęp do webadmin
VLAN 20 192.168.20.2/24 - o nazwie "pcs", do którego podłączam inne urzadzenia kablem lub wifi ale nie powinny mieć dostępu do webadmin
VLAN 30 192.168.30.2/24 - o nazwie "iot", tylko wifi bez dostępu do webadmin
Moja konfiguracja wygląda tak:
root@AX3000T:~# cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd6a:4de:5cd3::/48'
option packet_steering '1'
config device
option name 'br0'
option type 'bridge'
option igmp_snooping '1'
option ipv6 '0'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
list ports 'wan'
config bridge-vlan
option device 'br0'
option vlan '10'
option alias 'man'
list ports 'lan4:t'
list ports 'wan'
config bridge-vlan
option device 'br0'
option vlan '20'
option alias 'pcs'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4:t'
config bridge-vlan
option device 'br0'
option vlan '30'
option alias 'iot'
list ports 'lan4:t'
config interface 'man'
option proto 'static'
option device 'br0.man'
option ipaddr '192.168.10.2'
option netmask '255.255.255.0'
option ip6assign '60'
option type 'bridge'
config interface 'iot'
option proto 'static'
option device 'br0.iot'
option ipaddr '192.168.30.2'
option netmask '255.255.255.0'
option ip6assign '60'
option type 'bridge'
config interface 'pcs'
option proto 'static'
option device 'br0.pcs'
option ipaddr '192.168.20.2'
option netmask '255.255.255.0'
option ip6assign '60'
option type 'bridge'
config device
option name 'br0.10'
option type '8021q'
option ifname 'br0'
option vid '10'
option ipv6 '0'
config device
option name 'br0.20'
option type '8021q'
option ifname 'br0'
option vid '20'
option ipv6 '0'
config device
option name 'br0.30'
option type '8021q'
option ifname 'br0'
option vid '30'
option ipv6 '0'root@AX3000T:~# cat /etc/config/firewall
config defaults
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
option flow_offloading '1'
option flow_offloading_hw '1'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'man'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config zone
option name 'iot'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
list network 'iot'
config forwarding
option src 'iot'
option dest 'wan'
config zone
option name 'pcs'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
list network 'pcs'
config forwarding
option src 'pcs'
option dest 'wan'
config rule
option src 'iot'
option proto 'udp'
option src_port '67-68'
option dest_port '67-68'
option target 'ACCEPT'
option family 'ipv4'
option name 'iot'
config rule
option src 'iot'
option dest_port '53'
option target 'ACCEPT'
option family 'ipv4'
option name 'iot'
list proto 'tcp'
list proto 'udp'
config rule
option src 'pcs'
option proto 'udp'
option src_port '67-68'
option dest_port '67-68'
option target 'ACCEPT'
option family 'ipv4'
option name 'pcs'
config rule
option name 'pcs'
option family 'ipv4'
option target 'ACCEPT'
option dest_port '53'
option proto 'tcp udp'
option src 'pcs'Gdzie jest błąd?