This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Home Network - Should I Just Create A Firewall Rule for Internal (Network) - Any - Any IPv4 and Call It a Day?

I am very green when it comes to networking.  I am running Sophos UTM 9 Home Edition on a VM as my firewall.  I thought that I would go through my firewall rules and "harden" things up a bit by getting more granular with the rules. 

The first hurdle that I ran into was my Xbox & Xbox Live.  I gave the Xbox a static IP and created the following rule:  Xbox -> Any -> Any.  I also then created two DNAT rules so that the Xbox would report back with an open NAT to prevent any online gaming issues.

Next up....Ring Doorbell.  I had to give this a static IP and created the following rule:  Ring Doorbell -> Port Group for Ring (contains all the ports needed for the Ring doorbell) -> Any.  The doorbell worked and I could access it from my phone outside the network.  

The rub occurred when I tried to use my iPad on the network to access the Ring Doorbell.  It wouldn't connect.  Apparently, the App uses many of the same ports as the ring doorbell.  This included a port range from 16500 to 65000.

So my thinking was that I had a few options.  First, I could create create static IPs and network definitions for many of the devices on my home network that would be accessing the Ring doorbell....including phones iPads, tablets, Amazon Echo Shows, etc. and then create a firewall rule allowing these devices to run over these ports.  However, this seems very cumbersome.

Two, I could create a firewall rule for Internal (Network) -> Port Group for Ring -> Any.  This would then allow all devices on my internal network to utilize the necessary ports to access the Ring doorbell.  

Third, I could simply create a rule that states:  Internal (Network) -> Any -> Any.  This would prevent me from having to create static IPs for many of the devices in my home and configuring firewall rules to allow those devices / applications to communicate over specific ports.  

The third option seems the easiest by far, but what kind of security risks does it pose?  My thoughts that were if I was going to use option #2 above, it is already opening allowing my internal network to communicate over a vast range of ports.  So then why not all all internal devices to use all ports and be done with it?  



This thread was automatically locked due to age.