Hi all,
Forgive me if I've missed something obvious here, it's been a long weekend!
My ASGv7 has, aswell as it's internet interface:
One NIC connected to a 192.168.1.0/24 subnet called 'DMZ1'
One NIC connected to a 192.168.2.0/24 subnet called 'DMZ2'
The 192.168.1.0 subnet has a router on it which is in turn connected to a 192.168.3.0/24 subnet called 'Inner_LAN'
The 192.168.2.0 subnet has a webserver on it (192.168.2.2)
I have a network definition for 'HostPC' (192.168.3.2), and for 'Inner_LAN' (192.168.3.0/24)
I wish to setup packet filter rules to allow internet access from the webserver, but block traffic originating at the webserver, which is destined for hosts on the 'remote' 192.168.3.0 subnet (behind the router).
I've tried the following rules in the order shown:
1 - Source: DMZ2 (Network), Service: Any, Destination: Inner_LAN, Action: drop
2 - Source: DMZ2 (Network), Service: Any, Destination: HostPC, Action: drop
3 - Source: DMZ2 (Network), Service: Any, Destination: Any, Action: allow
What I expect should happen is that when attempting to send traffic from the webserver (192.168.2.2) to hostPC (192.168.3.2), the first rule should match, as the hostPC address is on the 'Inner_LAN' network.
Failing that, the second rule should certainly match as the traffic is destined for the exact IP address of the defined 'HostPC'.
However, what is actually happening is that the third rule is being applied and the traffic is being allowed through.
Why is this?
This thread was automatically locked due to age.