Consider the this simplified scenario with a LAN and a DMZ.
- The LAN must be able to access the DMZ
- The DMZ must be able to access anything on the internet
- The DMZ must not be able to access the LAN (except for whatever well crafted rules)
My LAN and DMZ have masquerade rules setup so internet requests go out to the WAN. I'm tripped up on the rules allowing the DMZ to access any IP, but not in the LAN.
- A rule allowing requests from the LAN to the DMZ works
- A rule allowing the DMZ to access to any IP allows it access to not only the Internet but the LAN!
- Creating either an "inbound" rule on the LAN blocking traffic from the DMZ, or vice versa an "outbound" rule disallowing access from the DMZ to the LAN blocks related or established traffic: so when the LAN makes a TCP request to the DMZ, the DMZ's SYN/ACK gets dropped.
I come from Linux knowing iptables quite well where defining the ingress and egress interfaces on a rule would fix this or where I could craft a rule allowing established or related traffic and this wouldn't be a problem. I feel like there's a trick I'm missing, but I've been looking all over and can't see one other than to craft explicit rules for every outbound connection. What's your advice?
This thread was automatically locked due to age.