Need help setting up ACLs
Hi everyone,
I could use some guidance with ACLs. I need to implement them, but I’d like a review first so I don’t accidentally break my home network.
I have five VLANs—trusted, camera, IoT, guest, and work—and I’m considering the following gateway/switch ACL setup. My network is a full Omada setup with the SDN controller running on Proxmox, along with the gateway, switch, and EAPs:
Gateway ACLs:
ALLOW FROM: VLAN 20 → TO: WAN TCP/UDP: 123 # NTP
DENY FROM: VLAN 20 → TO: WAN
DENY gateway web ui
ALLOW FROM: VLAN 10 → TO: VLAN 20,30,50
DENY FROM: VLAN 20 → TO: VLAN 10, 30, 40, 50
DENY FROM: VLAN 30 → TO: VLAN 10, 20, 40, 50
DENY FROM: VLAN 40 → TO: VLAN 10, 20, 30, 50
DENY FROM: VLAN 50 → TO: VLAN 10, 20, 30, 40
Switch ACLs
ALLOW VLAN 20,30,40,50 ↔ adguard-IP-Port (bi-dir)
ALLOW VLAN 20,30,40,50 ↔ NPM_IP-Port (bi-dir)
ALLOW HA_IP ↔ NVR_IP (bi-dir)
ALLOW Wireguard_Net ↔ VLAN 10 (bi-dir)
ALLOW Wireguard_Net ↔ NVR_IP (bi-dir)
ALLOW Wireguard_Net ↔ MacGroup_Shellies (bi-dir)
ALLOW MacGroup_Shellies ↔ mqtt_IP-Port (bi-dir)
Legend:
Wireguard_Net → 10.10.10.0/24 TCP/UDP
HA_IP → 192.168.10.18 TCP/UDP
MacGroup_Shellies → all Shellies mac address TCP/UDP
NVR_IP → 192.168.20.2 TCP/UDP
mqtt_IP-Port → 192.168.10.20:1883 TCP
adguard-IP-Port → 192.168.10.22:53 TCP/UDP
NPM-IP-Port → 192.168.10.17:80,443 TCP
some notes:
-
most of the shellies are gen4 zigbee, some are wifi but using mqtt to a dedicated broker
-
wireguard_net is the net I've configured in the omada controller. I need to be able to check devices and services in the trusted vlan + shelly webui in case proxmox goes down
Is this setup correct or should I change something? AFAIK, the flow is EAP_ACLs -> Switch_ACLs -> Gateway_ACLs, that's why I've blocked them at the gateway level (also because it's stateful, so I can initiate connection from vlan10 but not from other vlans).