1
General Discussion / Re: Blocking incoming traffic at the LAN/OPT level instead of the WAN
« on: April 06, 2018, 02:09:02 pm »Not that I'm aware of.
Interface rules are only applied to ingress traffic on the interface.
Floating rules can be configured as ingress and/or egress.
WAN ingress traffic is egress on the interface it is routed to.
To evaluate traffic at the routed to interface a floating egress rule would be needed.
In most cases it is typically better to leave everything blocked at the WAN and only open/NAT the things that are needed. Allowing the WAN to be wide open puts the router at higher risk of compromise. Don't think you'll find this to be a very common practice for an internet facing WAN. Certainly not a BKM. It may seem like more work, but think a compromised router would end up being far more work and impact.
The thing is, it's NOT an internet facing WAN. This is deeply internal and the firewall sits mostly at the center of the network. It's purpose mostly is for permitting access between various VLANs on a per need basis and further allowing in external internet IPs that have already been cleared by the edge.
I understand everyone's concern about security at the WAN level, but I cannot stress enough that this is not a problem based on the location of this firewall.
I guess conceptually what I'm needing is some sort of zoning. Like, WAN says "ok, this is good. Pass to the next zone for evaluation." Next "zone" being the destined VLAN.