Any Ubiquiti Unifi users? - Questions on zone firewall policies
I'd normally post this on reddit...but I thought I'd give the Tildes Tech Support Team a try. I have a Ubiquiti Unifi Cloud Gateway Ultra and I'm trying to better understand zone firewall...
I'd normally post this on reddit...but I thought I'd give the Tildes Tech Support Team a try.
I have a Ubiquiti Unifi Cloud Gateway Ultra and I'm trying to better understand zone firewall management and VLANs and all that.
I'll start with a screenshot. I'm only changing the two settings highlighted in red.
I'm trying to understand the difference between two firewall policy settings:
Action = Allow
ONLY, ANDConnection State = Return Traffic
Action = Allow
ANDAuto Allow Return Traffic checked
, ANDConnection State = All
I have two VLANs -- "Internal" and "Lab." Each is in their own policy zone, also called "Internal" and "Lab." The "Internal" VLAN does not have the "Isolate Network" option checked, but "Lab" does.
What I want is devices in "Internal" able to initiate and maintain connections with devices in "Lab." But I don't want devices in "Lab" able to initiate connections to devices in "Internal."
With Policy 1, "Internal" can't reach "Lab" nor vice versa. Hmm.
With Policy 2, "Internal" can ping and SSH into devices in "Lab," but not the other way around. Perfect; that's what I want.
And now my question(s): What is the difference between these two policies? To me, they look the same. But clearly the end results say they're not. So what's actually going on here? Additionally, assuming I could get Policy 1 to do what I want, is Policy 2 more vulnerable from a cybersecurity perspective than Policy 1?
If it helps, here's a screenshot of my zone matrix, with focus on source "Internal" and destination "Lab."
Thanks!