![]() ![]() Combine ports 1 to 8, inclusive, into a common hardware switch with an ether-1 master port and denote it by master, the remaining 2 through 8 inclusive, denote slave. Let us call our switch “switch-B”:ĭenote the physical LAN ports. ![]() Putting things in the correct order and it works properly.Now configure the switching node B with the Mikrotik CRS125-24G-1S I had put my rule to block IOT -> HOME traffic before the rule that allows forwarding of established connections. Is there anyway to configure a firewall rule to only allow the packets from the IOT devices through in response to an initial connection request from a HOME device? I have the default "allow established/related" rule enabled, but I'm not sure how a connection like that is tracked and when it gets added to the list of allowed connections.Įdit: I'm stupid, the default established/fastktrack rules to work properly. I could setup a rule allowing the response packet through.but that would allow my IOT devices to initiate access for that service in the other direction, from IOT to HOME, which is not what I want. I allow free access from my HOME VLAN to the IOT VLAN, but right now all the response packets from the IOT devices are blocked by the default blocking rule. However, some of my IOT devices have a service (web/smb etc) that I would like to access from my HOME VLAN. I've setup general firewall rules to block access from the IOT VLAN to the HOME VLAN. I've got two VLANs on my Mikrotik router: HOME and IOT.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |