This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Adding an explicit "allow" rule causes return packets to drop

I'm trying to set something up where I have a rule for a particular device on my LAN that will reject all traffic from that device to the internet (WAN on my XG), but then be able to define allow rules to sit above it in the rule list so that I can open up certain services. The problem is that even without the "reject" rule in place, the "accept" rule breaks communication! I'm so confused.

With the accept rule enabled, I can see packets go out through the rule in the logs, but nothing comes back. If I disable the accept rule, then communication works fine. What am I doing wrong??

From the log (shows 0 packets received):

Rule list:

Rule configuration:

To test, I'm trying to get to zoom.us from the "VTP White" device. I previously had the source zone set as LAN and destination zone as WAN, but changing them to Any/Any didn't change anything.



This thread was automatically locked due to age.
Parents
  • I didn't have a linked NAT rule, so I added that. That seems to have made zoom.us HTTPS work, but the time server NTP still doesn't work (logs show allowed and 1 packet sent, but 0 received).

  • Hi,

    you do not need house linked NAT rules, a simple MASQ will be more than suitable for most cases.

    If you open logviewer and search by destination service (123) what does logviewer show you?

    Ian

    XG115W - v20 GA - Home

    XG on VM 8 - v20 GA

    If a post solves your question please use the 'Verify Answer' button.

  • I changed something (not totally sure what) and NTP started working as well. So indeed it seems that lacking a NAT rule (simple MASQ rule) linked to the "allow" firewall rule was causing the problem.

    Prior to adding the linked NAT rule, the logs for a packet going out looked like the snip in my original post (for the zoom.us:443 and time-a.nist.gov:123). Packets sent, but no packets received, and no translated IP. Now everything looks correct in the logs and its all working properly.

Reply
  • I changed something (not totally sure what) and NTP started working as well. So indeed it seems that lacking a NAT rule (simple MASQ rule) linked to the "allow" firewall rule was causing the problem.

    Prior to adding the linked NAT rule, the logs for a packet going out looked like the snip in my original post (for the zoom.us:443 and time-a.nist.gov:123). Packets sent, but no packets received, and no translated IP. Now everything looks correct in the logs and its all working properly.

Children
No Data