Guide - Fine access control between site networks over ipsec site-to-site or SD-WAN

Guide - Fine access control between site networks over ipsec site-to-site or SD-WAN

Guide - Fine access control between site networks over ipsec site-to-site or SD-WAN
Guide - Fine access control between site networks over ipsec site-to-site or SD-WAN
2025-08-06 09:12:25

This guide will show you how to create fine-grained access control between networks on different sites when all linked togther in either site-to-site VPNs or SD-WAN

 

Prerequisites:

2+ Omada-Gateway based sites, Controller, VPNs or SD-WAN between sites already established and the Omada controller is fully connected to all gateways.  All gateways need to be on 5.15 adapted firmware or later to allow the "! IP_GROUP" (NOT ip_group) type of ACL.

 

 

The problem:

When establishing site-to-site VPNs or SD-WAN each site has full access to all the networks on all the other sites which are included in the tunnel.  Without ACLs in place, this could potentially allow communication between different networks at different sites that you dont want to allow.  This guide will show you how to control this.

 

This Example:

 

- Management LAN at each site - 192.168.0.0/24 and 172.20.0.0/24

- Technical LAN at each site - 192.168.2.0/24 and 172.20.2.0/24

- Office LAN at each site - 192.168.4.0/24 and 172.20.4.0/24

 

Goal:

- Allow the management LANs at each site to freely communicate to maintain full omada control

- Allow the Technical LAN at each site to communicate with each othe but not the management or office lans

- Allow the Office LAN at each site to communicate with each other but not the management or technical lans

 

How to configure:

We will be using stateful gateway ACLs on the WAN IN direction at each site to control access between all the lans.  

 

Step One

Create 3 IP groups at each site

 

Group 1- "VPN_Management" - This includes the management lans of all sites

Members - 192.168.0.0/24, 172.20.0.0/24

 

Group 2 - "VPN_Technical" - This includes the technical lans of all sites

Members - 192.168.2.0/24, 172.20.2.0/24

 

Group 3 - "VPN_Office" - This includes the office lans of all sites

Members - 192.168.4.0/24, 172.20.4.0/24

 

Step Two

Create the gateway ACLs in the following format, one for each IP group.  Create them at all sites where you want the rules to take effect

 

Deny > WAN IN > Protocol All

"!VPN_Management" > "VPN_MANAGEMENT"

"!VPN_Technical" > "VPN_Technical"

"!VPN_Office" > "VPN_Office"

 

 

How this works:

Since the ACLs are set as NOT_IP_Group > IP_Group is disallows anything that IS NOT in the ip group from accessing anything inside the same ip group, so, we dont need to make multiple IP groups for all the individual lans, we can use one group for each side of the rule.  Because we have all the LANs from all sites in the same category inside the same group, it allows all sites to communicate without having to generate multiple rules withing the scope of that group.  With the flexibility of the new style ! (NOT) rule it also means we dont have to set any explicit ALLOW rules which can open your network up to IP spoofing.  The firewall will continue to drop everything that isnt specifically in the rule list.

 

 

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0      
  0      
#1
Options