RT2600ac Crazy question (Router Firewall rules)

Currently reading
RT2600ac Crazy question (Router Firewall rules)

1,322
263
NAS
DS 718+, 2x-DS 720+
Router
  1. RT2600ac
Operating system
  1. Windows
Mobile operating system
  1. iOS
Last edited:
Crazy idea: Is it possible (legal) that a firewall rule like this could exist and work?

TCP/UDP, all ports, IP RANGE:192.168.1.160-.255, TCP/UDP, all ports, IP RANGE: 192.168.1.2-.159 DENY

Not near it to test. Thank you
 
Last edited:
Trying to avoid VLAN
But just occurred to me. Port 3 of 2600 goes to unmanaged switch, so, in theory… switch is occurring before 2600….
So maybe NOT!
I see I didn’t lay out System here with this in mind….

So, let me re-phrase this….
If .2….159 was on port 1 of 2600, and port two contained .160…..255

Would the rule then work???
 
I mis-read your second IP range as there was a comma in it. Didn’t notice they are both on the same 192.168.1.x range. You have to have these ranges correctly defined in the router/firewall so they actually get to the firewall functionality.

The firewall has to see these ranges as distinct separate subnets associated with specific VLANs. The routing table has to know which next hop gateway (or router VLAN interface) is used to send on to these subnets.

In general the firewall won’t be used for mediating connections that it believes are on the same LAN/VLAN subnet.
 
I know the nas has a drop down so that you can set firewall rules on each interface.

Idk about router manager, but if it’s the same instead of doing the firewall rules in all interfaces drop down you would do a rule of 192.168.1.2-.159 allow on interface 1 and then 192.169.1.160-.254 of interface 2.
 
Last edited:
Now I'm not looking on my phone....

The best you can do is to split the single 192.168.1.0/24 subnet and, in SRM terms, assign each new smaller subnet to different LAN-side VLANs.

VLANSimple DesignComplex design #1Complex design #2
ASingle subnet
192.168.1.0/25 (.0 - .128)
Primary subnet
192.168.1.0/25 (.0 - .128)

Router on VLAN A as gateway to secondary subnet
192.168.1.129/27 (.129 - .159)

SRM routing table updated to use Router on VLAN A IP as next hop for secondary subnet
Single subnet
192.168.1.0/25 (.0 - .128)

Allow full access between VLANs A and A1
A1----Single subnet
192.168.1.129/27 (.129 - .159)

Allow full access between VLANs A and A1
BSingle subnet
192.168.1.129/25 (.129 - .255)
Primary subnet
192.168.1.160/27 (.160 - .191)

Router on VLAN B as gateway to secondary subnet
192.168.1.192/26 (.192 - .255)

SRM routing table updated to use Router on VLAN B IP as next hop for secondary subnet
Single subnet
192.168.1.160/27 (.160 - .191)

Allow full access between VLANs B and B1
B1----Single subnet
192.168.1.192/26 (.192 - .255)

Allow full access between VLANs B and B1
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Welcome to the forum. Go to the Forums list, then scroll down to find the router section...
Replies
1
Views
138
Nope. As far as I can tell it’s all under the hood. In business doing quality or class of service helps to...
Replies
3
Views
1,281
Mr. T! You are Correct! I just learned this elsewhere!! Those IP’s Does unexpected things with pings and...
Replies
5
Views
1,543
Per your initial reply..."Then sell it... which is what I guess prompted this question." 😊
Replies
4
Views
4,588
Update: Yes that worked, but Googling: “Pros & Cons of blocking ICMP” Made me realize I’m barking up...
Replies
5
Views
2,504
I've already posted this in Synology official forum, but maybe here I get more help, or quicker :-) I'm...
Replies
0
Views
1,087

Welcome to SynoForum.com!

SynoForum.com is an unofficial Synology forum for NAS owners and enthusiasts.

Registration is free, easy and fast!

Trending threads

Back
Top