Hi everyone, this is my first post on the forum although I've been passive reader for a while now.
I posted a doubt yesterday on the synology subreddit but it doesn't seem to have attracted much feedback, so I though maybe you people would have some insight. I'm copying below what I wrote there, sorry for the spam if you've been there and already seen this.
I'm trying to set some kind of external access to my NAS using Cloudflare and there's some behavior with the firewall I don't understand, possibly I'm doing something wrong...
I have the cloudflare ip ranges in the "trusted proxies" section, which as per the very VERY short description in the documentation DSM should work with the origin ip instead of the cloudflare one:
DiskStation Manager - Knowledge Base | Synology Inc.
This seems to work, I connect through cloudflare and on "connected users" the ip that appears is the origin ip instead of the cloudflare one (before adding the cloudflare ip ranges to trusted proxies I'd get the cloudflare ip).
I've tried to fail to log too many times and auto-block correctly blocks the origin ip and enforces the protection.
Now I try to block the origin IP on the firewall as my plan is to allow access only to certain IP ranges and I want to check that IPs not in that range are blocked.
To test this I'm outside of the LAN, but I also have VPN access through a different server on the LAN:
I posted a doubt yesterday on the synology subreddit but it doesn't seem to have attracted much feedback, so I though maybe you people would have some insight. I'm copying below what I wrote there, sorry for the spam if you've been there and already seen this.
I'm trying to set some kind of external access to my NAS using Cloudflare and there's some behavior with the firewall I don't understand, possibly I'm doing something wrong...
I have the cloudflare ip ranges in the "trusted proxies" section, which as per the very VERY short description in the documentation DSM should work with the origin ip instead of the cloudflare one:
DiskStation Manager - Knowledge Base | Synology Inc.
This seems to work, I connect through cloudflare and on "connected users" the ip that appears is the origin ip instead of the cloudflare one (before adding the cloudflare ip ranges to trusted proxies I'd get the cloudflare ip).
I've tried to fail to log too many times and auto-block correctly blocks the origin ip and enforces the protection.
Now I try to block the origin IP on the firewall as my plan is to allow access only to certain IP ranges and I want to check that IPs not in that range are blocked.
To test this I'm outside of the LAN, but I also have VPN access through a different server on the LAN:
- I put a rule at the top of the firewall rules with my ip address, all ports and deny as action and...
- Well, I still have access!, on "connected users" there I am with the very IP that I just added to deny access on the firewall.
- I actually thought that I would not even be able to set the rule as I undertand that the firewall rules are not saved if DSM detects that you cannot connect after making the change. But the rule is saved and there... I've even tried setting the rule while connected through the VPN with the same result.