What is a good way to compartmentalize vlans from each other through the XG?
Say I have general lan (vlan1) and I don't want vlan1 to talk to vlan50, or vlan50 to talk to vlan60.
This thread was automatically locked due to age.
What is a good way to compartmentalize vlans from each other through the XG?
Say I have general lan (vlan1) and I don't want vlan1 to talk to vlan50, or vlan50 to talk to vlan60.
Can you give me an example of a rule? I'm still trying to figure out the method of thinking when it comes to designing these rules. Coming from pfsense ha.
I've created a rule that prevents any of the vlans from talking to the entire LAN section. However LAN can talk to them. They are still able to get out to the web. It was end of the day so I didn't get to test if they could communicate between each other.
Can you give me an example of a rule? I'm still trying to figure out the method of thinking when it comes to designing these rules. Coming from pfsense ha.
I've created a rule that prevents any of the vlans from talking to the entire LAN section. However LAN can talk to them. They are still able to get out to the web. It was end of the day so I didn't get to test if they could communicate between each other.
Ian,
since first version, firewall rules do not accept port on source network.
I remember even a Sophos KB where they say do not use ports inside source network (quite new KB than what discovered from community) but I cannot find it.