{ "service":{ "nat":{ "rule":{ "5010":{ "description":"IoT", "destination":{ "address":"192.168.20.0/24" }, "log":"disable", "outbound-interface":"eth0.20", "protocol":"all", "source":{ "address":"192.168.1.0/24" }, "type":"masquerade" } } } }
Outbound NAT rule on the IoT interface?
You can do it the way I do it between my primary VLAN and my IOT VLAN. Primary can talk to any device on my IOT, IOT devices have no access to anything on the primary VLAN.On your Primary VLAN you add a rule, this one should be there already, but if not.Action: PassProto: IPv4/6 Source: Any Dest: Anyand on the IOT VLAN Action: BlockProto: IPv4/6 Source: Any Dest: VLAN_NetThere are some others to block/allow specifics, but that's the basics.
Quote from: Greelan on May 01, 2021, 01:33:39 amOutbound NAT rule on the IoT interface?This seems to be the way, I will just need to figure out how
Quote from: slusk on May 01, 2021, 12:56:29 pmQuote from: Greelan on May 01, 2021, 01:33:39 amOutbound NAT rule on the IoT interface?This seems to be the way, I will just need to figure out how Enable hybrid mode, then in the rule make the translation/target “interface address”, the rest should be self-explanatory