Thanks for the response! Here are my firewall rules:
LAN Interface rules:
- Default allow LAN to any rule
- Specific rule allowing LAN to SecurityVLAN
SecurityVLAN Interface rules:
- Allow Reolink Camera (192.168.20.102) TCP/UDP return traffic to LAN
- Allow Reolink Camera ports specifically (80, 443, 554, 8000, 9000) via both TCP and UDP
- Allow internal SecurityVLAN communication
- Allow DNS to OPNsense
- Block SecurityVLAN from initiating LAN connections (after specific allow rules)
- Allow SecurityVLAN Internet Access
Regarding your question about Layer 3 routing on the switch:
No, all routing is handled by OPNsense. The switch (TP-Link TL-SG3428) is only doing VLAN tagging at Layer 2. It's managed via an Omada OC200 controller.
One detail that might be relevant: I'm using Hybrid outbound NAT rule generation. I have a manual rule for another device on the Security VLAN with Static Port: YES, but the automatic rules for all networks have Static Port: NO. Could this be causing the state tracking issues?
LAN Interface rules:
- Default allow LAN to any rule
- Specific rule allowing LAN to SecurityVLAN
SecurityVLAN Interface rules:
- Allow Reolink Camera (192.168.20.102) TCP/UDP return traffic to LAN
- Allow Reolink Camera ports specifically (80, 443, 554, 8000, 9000) via both TCP and UDP
- Allow internal SecurityVLAN communication
- Allow DNS to OPNsense
- Block SecurityVLAN from initiating LAN connections (after specific allow rules)
- Allow SecurityVLAN Internet Access
Regarding your question about Layer 3 routing on the switch:
No, all routing is handled by OPNsense. The switch (TP-Link TL-SG3428) is only doing VLAN tagging at Layer 2. It's managed via an Omada OC200 controller.
One detail that might be relevant: I'm using Hybrid outbound NAT rule generation. I have a manual rule for another device on the Security VLAN with Static Port: YES, but the automatic rules for all networks have Static Port: NO. Could this be causing the state tracking issues?