• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Allow IPSEC to all on LAN except

Scheduled Pinned Locked Moved Firewalling
4 Posts 2 Posters 570 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    ChrisFromDallas
    last edited by Mar 17, 2023, 7:46 PM

    I have a IPSEC tunnel between the home office and the remote office. I want to allow all traffic across the VPN except for a group of IP addresses at the remote office, which I have created an alias group for.

    But whatever I try doesn't seem to work in blocking the VPN traffic from the disallowed IPs.

    Hoping for some help in creating a rule to block traffic bound for the home office for a certain group of IPs on the remote office network. Any suggestions?

    V 1 Reply Last reply Mar 17, 2023, 7:58 PM Reply Quote 0
    • V
      viragomann @ChrisFromDallas
      last edited by Mar 17, 2023, 7:58 PM

      @chrisfromdallas
      You need to put the block rule with the alias as destination above of the pass any-rule on LAN to get it applied first.

      Also consider to delete the states after adding a block rule. If there is an existing state the traffic keeps on passing.

      C 1 Reply Last reply Mar 17, 2023, 8:14 PM Reply Quote 0
      • C
        ChrisFromDallas @viragomann
        last edited by Mar 17, 2023, 8:14 PM

        @viragomann Thanks, but unfortunately I must be missing something.

        On my REMOTE OFFICE router, I set a rule like this on the LAN section:

        Protocol: IPv4*
        Source: 192.168.0.0/24 (the HOME OFFICE subnet)
        Port: *
        Destination: GuestIPs (the alias group for the disallowed IP addresses)
        Port: *
        Gateway: *

        That rule is at the top of the list, and after clearing states I'm still able to pass traffic from the disallowed IPs at REMOTE OFFICE to the LAN at HOME OFFICE.

        Any ideas where I may have gone wrong?

        V 1 Reply Last reply Mar 17, 2023, 8:23 PM Reply Quote 0
        • V
          viragomann @ChrisFromDallas
          last edited by Mar 17, 2023, 8:23 PM

          @chrisfromdallas
          The rule has to be added to the interface, where the traffic is coming in. So this might be IPSec in the office.

          I was talking about your site before.
          But if you have access to the remote site, est practice is to only allow certain destinations.
          You can do this by addition the pass rule on IPSec, state the alias (for IPs to block) and check "invert match". So the pass then allows any, but the IPs in the alias.

          1 Reply Last reply Reply Quote 0
          4 out of 4
          • First post
            4/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received