Looking for help with VLANs and ACL for allowing limited traffic between VLANs
I'm trying to configure VLANs and ACL to allow clients on one VLAN to have access to my home assistant server on a different VLAN. Here is my network setup
TL-605, TL-SG2008P, and EAP245, Omada controller software on PC
TL-SG2008P:
EAP245 (Port 1 - VLAN1 Native, VLAN 10, 20, 30 Tagged)
PC (Port 2 - VLAN1 Native)
Home Assistant (Port 3 - VLAN 30 Native)
TL-605 (Port 8 - All port profile)
VLANS are set up as Interfaces with DHCP enabled on separate subnets
With all ACL rules off, I can ping/connect to HA on VLAN 30 from my PC on VLAN 1 and from an iPad on VLAN 10
Relavent ACL rules (all other rules disabled):
"deny all protocols, source: network interface for VLAN 30 to destination: other network interfaces/VLANS" - This is at the bottom of the ACL stack. With only this enabled I can't ping/connect to HA on any VLAN other than VLAN 30.
"Permit all protocols, source: network/VLAN 10 to destination: HA IP Group" - This is at the top of the stack. When first enabled or moved in the ACL list, a couple of pings will be returned then the rest time out, and no connection to HA from any other VLAN.
I'm sure its something simple that I'm overlooking, but at this point I can see the forest for the trees. I've been following tutorials for setting this up, most commonly on a Unifi system. Can anyone point me in the right direction with either my configuration, or with an online reference to accomplish this?