Hi,best practise is to create an alias (RFC1918) with private IPv4 address ranges.Than on the VLAN99 where you want to have internet only create the following rule:Interface: VLAN99Source: AnyProtocol: TCP/UDPDestination invert: checked (IMPORTANT)Destination: RFC1918Destination Port: 80,443This allows TCP/UDP traffic for Port 80,44 only to Internet (IPv4).br
What if their IOT devices need to access ports other than the two listed? And what if the ports they need aren't well documented? They would have to allow all just to see what is happening on the VLAN, right?
Looking at this page, though, there are a ton of possible ports
yep. That rule with !1918 worked for web access for the IoT devices. Restricted it to what I need (port 80 and 443 to some IPs/Hosts)Now for allowing specific rules from VLAN99 to LAN .. for example ICMP. Would I need to generate 2 rules? One on the IoT interface for outgoing traffic and one on the LAN interface for incoming ICMP from the IoT net as source? (Assuming I don't have/want an allow all out from the IoT network)