1
General Discussion / Re: Issues with allowing traffic between interfaces "let out anything from firewall"
« on: July 29, 2023, 02:36:19 pm »
I suppose I am writing to myself for the next one having similar issues...
But as I make progress I am adding information in the hope that will be helpful.
Solution
All TP-Link smart devices have an explicit setting for the route (other than the gateway) and have an explicit option for L3 connection which basically means they are routing to another subnetwork and allow devices coming from different subnetworks to connect. I have enabled the L3 options on both Access Points (EAP670) and the switch (TL-SG2008P) and I am now able to access from other networks. The reason why I didn't see this before is because it isn't in the Management or Security part of the interface but rather hidden on 3rd level menus...
Anyhow I had to add a VLAN ID: 1 to be able to manage all devices, because they are configured in such a way that you can't remove it, but I found a rather secure way to enter the management VLAN using a tagged port on the switch, that by default assigns the user network VLAN tag, while at the same time allows the already tagged VLAN 1 traffic to pass through. To create the VLAN for management spanning on all networks I had to create one VLAN connection with the tag 1 for each of the physical interfaces to which there are infrastructure devices connected and then I had to create a VLAN Bridge interface to include them all, and finally enable DHCP on that bridge. It seems to be a bit cumbersome but it works so far. I prefer to have DHCP running and then assign static leases rather than having static IPs, it makes the management easier and I do not have to access all of the devices individually to change IPs in case it is necessary.
Now the next challenge... making Apple devices and HomeKit work while being on different subnetworks... I will check around if there is already documentation about this, or I will start another post.
Thanks to everyone who contributed to help out...
But as I make progress I am adding information in the hope that will be helpful.
Quote
a. I am connected with an admin_ip in the 192.168.148.0/24 network, and I am trying to connect to a switch which is on 192.168.148.0/24 network both on port HTTPS and SSH, but the traffic doesn't go through. I am able to ping the device though, which means that ICMP traffic is going through, and I have a rule for that which states that all ICMP requests from admin_ips are allowed in, and then the allow everything out of the firewall allows for the response to come back.
Solution
All TP-Link smart devices have an explicit setting for the route (other than the gateway) and have an explicit option for L3 connection which basically means they are routing to another subnetwork and allow devices coming from different subnetworks to connect. I have enabled the L3 options on both Access Points (EAP670) and the switch (TL-SG2008P) and I am now able to access from other networks. The reason why I didn't see this before is because it isn't in the Management or Security part of the interface but rather hidden on 3rd level menus...
Anyhow I had to add a VLAN ID: 1 to be able to manage all devices, because they are configured in such a way that you can't remove it, but I found a rather secure way to enter the management VLAN using a tagged port on the switch, that by default assigns the user network VLAN tag, while at the same time allows the already tagged VLAN 1 traffic to pass through. To create the VLAN for management spanning on all networks I had to create one VLAN connection with the tag 1 for each of the physical interfaces to which there are infrastructure devices connected and then I had to create a VLAN Bridge interface to include them all, and finally enable DHCP on that bridge. It seems to be a bit cumbersome but it works so far. I prefer to have DHCP running and then assign static leases rather than having static IPs, it makes the management easier and I do not have to access all of the devices individually to change IPs in case it is necessary.
Now the next challenge... making Apple devices and HomeKit work while being on different subnetworks... I will check around if there is already documentation about this, or I will start another post.
Thanks to everyone who contributed to help out...