ER605 LAN Security Configurations

ER605 LAN Security Configurations

ER605 LAN Security Configurations
ER605 LAN Security Configurations
2024-06-23 13:49:31 - last edited 2024-06-24 00:58:47
Model: ER605 (TL-R605)  
Hardware Version: V2
Firmware Version: 2.2.3 Build 20231201 Rel. 32918

Basic configuration is three WAN ports (WAN, WAN/LAN1, WAN/LAN2) and two LAN Ports.

I wish to achieve a LAN for secure traffic (e.g. PCs, etc) on Port 4 while traffic on Port 5 is an isolated LAN for public traffic.

 

Network/LAN

ID 1, LAN, 10.0.0.1, 255.255.255.0, DHCP Enabled

ID 2, Futile, 10.0.100.1, 255.255.255.0, DHCP Enabled

 

Network/VLAN

ID 1, VLAN ID 4, Name vlan4, Ports (4 UNTAG), Description LAN

ID 2, VLAN ID 5, Name vlan5, Ports (5 UNTAG), Description Futile

 

Firewall/Access Control

ID 1, Name FutileBlock, Policy Block, Service Type ALL, Direction LAN->LAN, Source Network Futile, Destination Network LAN, Effective Time ANY

ID 2, Name LANBlock, Policy Block, Service Type ALL, Direction LAN->LAN, Source Network LAN, Destination Network Futile, Effective Time ANY

 

If I connect a PC to Port 5, DHCP configures the PC with 10.0.100.100 which is correct but using a web browser I can connect to the ER605 using the URL http://10.0.0.1

The expectation was LAN traffic is isolated to specific Ports. Access Control limits access in both directions. Unfortunately a connection across LANs still exists.

Reboot does not change behaviour, can still login to LAN management port from the Futile LAN.

VLAN 1 is obviously missing so this was created.

 

Network/LAN

ID 1, LAN, 10.0.0.1, 255.255.255.0, DHCP Enabled

ID 2, Futile, 10.0.100.1, 255.255.255.0, DHCP Enabled

ID 3, VLAN1, 192.168.0.1, 255.255.255.0, DHCP Enabled

 

Network/VLAN

ID 1, VLAN ID 1, Name vlan1, Ports 4(TAG) 5(TAG), Description VLAN1

ID 2, VLAN ID 4, Name vlan4, Ports (4 UNTAG), Description LAN

ID 3, VLAN ID 5, Name vlan5, Ports (5 UNTAG), Description Futile

Reboot does not change behaviour, can still login to LAN management port from the Futile LAN.

Changed VLAN1 Port configuration.

 

Network/VLAN

ID 1, VLAN ID 1, Name vlan1, Ports 4(TAG), Description VLAN1

ID 2, VLAN ID 4, Name vlan4, Ports (4 UNTAG), Description LAN

ID 3, VLAN ID 5, Name vlan5, Ports (5 UNTAG), Description Futile

Can still login to LAN management port 10.0.0.1 from the Futile LAN.

 

Try URL filtering to block traffic.

Preferences/IP Group/IP Address

ID 1, Name IP_LAN, IP Address Type IP Address/Mask, IP Address Range 10.0.0.0/24, 10.0.100.0/24, 192.168.0.0/24 IP Address/Mask 10.0.0.0/24, 10.0.100.0/24, 192.168.0.0/24 Description IP_LAN

ID 2, Name IP_Futile, IP Address Type IP Address/Mask, IP Address Range 10.0.100.0/24, IP Address/Mask 10.0.100.0/24, Description IP_Futile

 

Preferences/IP Group

ID 1, Group Name IPGROUP_ANY, Address Name ---, Description IPGROUP_ANY

ID 2, Group Name IPGROUP_LAN, Address Name IP_LAN, Description IPGROUP_LAN

ID 3, Group Name IPGroup_Futile, Address Name IP_Futile, Description IPGroup_Futile

 

Behavior Control/Web Filtering/URL Filtering

Enable URL Filtering

ID 1, IP Group IPGroup_Futile, Policy Deny, Mode URL Path, Filtering Content 10.0.0.1 10.0.100.1, Effective Time Any, Status Enabled, Description Management Restrictions

 

PC on Futile LAN at IP Address 10.0.100.100 can still login to ER605 management web page at 10.0.0.1 on LAN, unable to isolate access. 

Currently testing with one PC so no testing from PC to PC across the two LANS.

What have I misconfigured?

 

  0      
  0      
#1
Options
5 Reply
Re:ER605 LAN Security Configurations
2024-06-24 00:58:29

Hi @PDP11 

Thanks for posting in our business forum.

You should try to set up the Gateway Management Page block so that you can block the access from the Futile VLAN to the LAN. If you are in standalone mode, create the Service for 80 and 443. If necessary, you can also add other access ports to the service and create the ACL to prevent that access from the Futile.

 

Access to the 10.0.0.1 or 10.0.100.1 is not restricted unless you set up the ACL to stop it.

If you block that, it will cause a problem with Internet access.

 

Best Regards! If you are new to the forum, please read: Howto - A Guide to Use Forum Effectively. Read Before You Post. Look for a model? Search your model NOW Official and Beta firmware. NEW features! Subscribe for the latest update!Download Beta Here☚ ☛ ★ Configuration Guide ★ ☚ ☛ ★ Knowledge Base ★ ☚ ☛ ★ Troubleshooting ★ ☚ ● Be kind and nice. ● Stay on the topic. ● Post details. ● Search first. ● Please don't take it for granted. ● No email confidentiality should be violated. ● S/N, MAC, and your true public IP should be mosaiced.
  0  
  0  
#2
Options
Re:ER605 LAN Security Configurations
2024-06-24 02:46:12

The Access Control entries were created to block LAN to LAN access but they didn't seem to achieve anything.

 

Worst comes to the worst I can stop using the standalone mode and install Omanda software on a PC.

 

Regards,

Garry

  0  
  0  
#3
Options
Re:ER605 LAN Security Configurations
2024-06-24 02:52:11

Hi @PDP11 

Thanks for posting in our business forum.

PDP11 wrote

The Access Control entries were created to block LAN to LAN access but they didn't seem to achieve anything.

 

Worst comes to the worst I can stop using the standalone mode and install Omanda software on a PC.

 

Regards,

Garry

From different VLANs to the gateway, that’s LAN to LAN. There is no doubt about that.

You have to make sure the service is properly set and selected when you are setting up the ACL.

 

If you expect to use the controller, note that when you adopt the device, your config in standalone will be erased. Please back up before you make any changes.

Best Regards! If you are new to the forum, please read: Howto - A Guide to Use Forum Effectively. Read Before You Post. Look for a model? Search your model NOW Official and Beta firmware. NEW features! Subscribe for the latest update!Download Beta Here☚ ☛ ★ Configuration Guide ★ ☚ ☛ ★ Knowledge Base ★ ☚ ☛ ★ Troubleshooting ★ ☚ ● Be kind and nice. ● Stay on the topic. ● Post details. ● Search first. ● Please don't take it for granted. ● No email confidentiality should be violated. ● S/N, MAC, and your true public IP should be mosaiced.
  1  
  1  
#4
Options
Re:ER605 LAN Security Configurations
2024-06-24 04:46:06 - last edited 2024-06-24 04:48:37

  @Clive_A I'm using the two VLANs as the source and destination networks in the LAN to LAN ACL. It is as though there is a default pass ANY before the LAN to LAN blocks. I haven't tried the CLI to see if there is something obviously wrong. That might provide an answer.

  0  
  0  
#5
Options
Re:ER605 LAN Security Configurations
2024-06-25 06:25:48 - last edited 2024-06-25 06:32:42

Used PuTTY to connect to the CLI and checked all settings with the various SHOW commands documented in the CLI user guide. All this did was use the CLI to confirm the standalone Web interface settings. Unfortunately the CLI did not provide any additional information. At this point I don't know why I am unable to implement filtering of the ER605 Web Management interfaces. Guess I've broken something when trying to implement this network configuration, or not being able to disable Management Interfaces is a TP-Link design choice to prevent a user from disabling their ER605 management. Changing the Management address interfaces to some random numbers is just trying to protect by obscurity and not desirable. 

 

I had been hoping to use un-managed switches behind the ER605 to implement a very simple network. I'm beginning to suspect that TP-Link Easy Smart switches are not going to be a solution if the ER605 Management interfaces can not be isolated. I don't know if L2/L3 switches can offer a solution. I would hate to need a firewall behind the ER605 to protect the ER605, in that case I may as well throw the ER605 away.

 

Next step is to test using the Omada PC software which should disable the web interfaces.

  0  
  0  
#6
Options