I have an app on my Mac (Bookends) which maintains a database of book titles. If I enter a new book's ISBN number, Bookends will query Amazon and return with the book's title, author, publisher, etc. The difficulty is that Amazon Web Services (AWS) will respond with a new source IP so that the Firewall thinks it's a rogue attack and blocks it. I have created a list of networks (e.g. AWS054-000 54.0.0.0/8 WAN interface) which detail many of AWS servers. I have over 50 such network definitions so far and am adding more. Then I have a Network Group defined that pulls this long list of network definitions together so that I can make a Firewall Rule allowing AWS to the single specific LAN computer that uses Bookends. But in my firewall log I can see that 54.86.89.255, 54.152.225,202, 54.165.14.197 have been blocked.
Given the my definition of AWS054-000 (above), how can these listed IP address be blocked? My limited cerebral powers seem to be rapidly evaporating.
(1) I just need to know whether anyone has successfully used network definitions with wide CIDR ranges (/16 to /10)? My CIDR ranges do NOT seem to be working.
(2) I have checked "Log Traffic" on my firewall rule. How can I find the allowed transactions that are successfully matching my rule? I don't think there are any. But I don't understand how to verify my intuitions.
This thread was automatically locked due to age.