Gateway ACL LAN to LAN feature is not working

Gateway ACL LAN to LAN feature is not working

Gateway ACL LAN to LAN feature is not working
Gateway ACL LAN to LAN feature is not working
a week ago - last edited a week ago
Model: ER707-M2  
Hardware Version: V1
Firmware Version: 1.2.3 Build 20240822 Rel.52946

I have configured VLANs 10, 20, 30, 100, and 200. The IPs are 192.168.x.0/24 (x being the VLAN ID).

 

VLAN 100 and 200 are applied on a SSID broadcast by my APs. I want to block access of VLAN 100 and 200 to all other VLANs. The VLANs are created with the purpose as interface, so routing is done on the gateway.

 

Gateway ACLs proven to be useless as I can still ping other VLANs when Im in both VLAN 100 and 200. A change the Switch ACL fixed the problem. What is the issue here and why does Gateway ACL not work?

  0      
  0      
#1
Options
9 Reply
Re:Gateway ACL LAN to LAN feature is not working
a week ago

  @Jason7186 

 

Generally gateway ACLs still allow all the gatewai IPs of all vlans hosted on the gateway to be pingable.  Why? who knows, just how it is.

 

In all other ways gateway lan<>lan ACLs work fine

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  1  
  1  
#2
Options
Re:Gateway ACL LAN to LAN feature is not working
a week ago

  @Jason7186 

Thank you for your post. They should indeed work. How did you configure the ACL? Two ACL entries are required here, or you should enable bidirectional ACL blocking when configuring—once enabled, two ACL entries will be created automatically.

  0  
  0  
#3
Options
Re:Gateway ACL LAN to LAN feature is not working
Sunday - last edited Yesterday

  @Jason7186

 

I just came across this thread so I may be late in commenting here.  In my network, the gateway ACLs work fine in preventing VLANs from reaching each other EXCEPT for the VLAN interfaces on the gateway.  I can still ping the VLAN gateway address and navigate to the VLAN gateway's GUI.  Just yesterday, I discovered that by creating an additional gateway rule to deny access for certain VLANs to the destination "Gateway Management Page", those VLANs can no longer access the gateway GUI.  Setting the protocols to "All" also prevents the VLAN devices from pinging the gateway.  In my case, I sometimes use a laptop on a particular VLAN for maintenance and testing.  I changed the new gateway ACL to only deny the TCP protocol and this allows me to ping the gateway when needed.

 

1x ER706W 1x OC300 4x SG2008 1x EAP610 2x EAP650
  1  
  1  
#5
Options
Re:Gateway ACL LAN to LAN feature is not working
Yesterday

  @Jason7186 

 

Be careful setting a lan<>lan ACL to the gateway page with "ALL" protocols - this will totally kill internet access for the vlans in the rule.  (what actually kills it is having the ICMP protocol selected either on its own or with others / all).  Selecting TCP is enough to prevent GMP GUI access

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0  
  0  
#6
Options
Re:Gateway ACL LAN to LAN feature is not working
Yesterday

  @GRL 

 

I suspect that this may be gateway dependent or perhaps a flaw in the firmware.  On my gateway, setting the protocols to "All" did not kill internet access for the VLANs involved.

 

1x ER706W 1x OC300 4x SG2008 1x EAP610 2x EAP650
  0  
  0  
#7
Options
Re:Gateway ACL LAN to LAN feature is not working
Yesterday

  @jra11500 

 

Interesting, it certainly does on the 605 v2, 8411 and 7206 v2 i have on different sites!  (all on the latest too)

 

It didnt used to - maybe a year or so ago something changed, even clive confirmed it in some random post i saw of his on a thread ages ago

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0  
  0  
#8
Options
Re:Gateway ACL LAN to LAN feature is not working
Yesterday

  @GRL 

 

I am going to look into this a little further.  I only briefly tested everything when I added the new rule and everything was working OK.  Later I will post the results here.

 

1x ER706W 1x OC300 4x SG2008 1x EAP610 2x EAP650
  0  
  0  
#9
Options
Re:Gateway ACL LAN to LAN feature is not working
Yesterday

  @jra11500 

 

Yeah, worth looking at since you have a different router model

 

As far as i can tell, the "Gateway Management Page" isnt just the web gui, but the entire WAN Side / Internal side of "The Router Itself"  as by using a location group WAN IN > GMP block you can also prevent geographic VPN login attempts as well, works the same for a IP_Group too

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0  
  0  
#10
Options
Re:Gateway ACL LAN to LAN feature is not working
Yesterday - last edited Yesterday

  @GRL 

 

I just finished testing the use of an ACL rule to deny access to the gateway from selected VLANs.  Here is the rule I used:

For testing I used an HP laptop and a Windows PC.  Here are the results:

 

Test 1
- ACL configured to deny all protocols
- PC connected to the controller via the Mgmt VLAN (wired)
- Laptop connected to the Public VLAN via Wi-Fi
- Laptop is unable to connect to the gateway GUI
- Laptop unable to ping the gateway
- Laptop CAN connect to the internet and navigate without any issues

 

Test 2
- Laptop connected to a different (IoT) VLAN via Wi-Fi
- Connection/ping results same as in Test 1

 

Test 3
- Laptop connected to controller via Mgmt VLAN Wi-Fi
- SG2008 switch port for the PC changed to the VLAN profile “Public”
- PC rebooted to obtain a new IP address on the Public VLAN
- PC is unable to connect to the gateway GUI
- PC unable to ping the gateway
- PC can connect to the internet and navigate without any issues

 

Conclusion:  Because other forum members have reported issues with different gateway models, it appears that the issue of no internet access when using all protocols in the ACL rule is a problem that does not affect all gateways.

 

Related links:
1. https://community.tp-link.com/en/business/forum/topic/841238
2. https://community.tp-link.com/en/business/forum/topic/642230
3. https://www.reddit.com/r/TPLink_Omada/comments/196s5gu/block_gateway_management_page_also_block_internet/

 

1x ER706W 1x OC300 4x SG2008 1x EAP610 2x EAP650
  0  
  0  
#11
Options