- CheckMates
- :
- Products
- :
- Quantum
- :
- SMB Gateways (Spark)
- :
- Re: Simple internal rule not been caught
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Simple internal rule not been caught
Hello,
I'm trying to block access to a specific network object, but whatever I do, access is not blocked.
Any ideas why ?
Screenshot of rule base attached, any hint will be appreciated.
BTW, outgoing to the internet (wan) blocking rules work fine, only internal. isn't these smbs gateways able to block internal objects ? will be a bummer if so...
Thanks !
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Of course that is possible if the SMB is configured appropriately ! Did you read Quantum Spark 1500, 1600 and 1800 Appliance Series R80.20.30 Locally Managed Administration Guide p.77 as i suggested ? Next sentence after the one cited is:
Configure multiple bridges between interfaces. Traffic in a bridge is always monitored and inspected by the appliance.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Quantum Spark 1500, 1600 and 1800 Appliance Series R80.20.30 Locally Managed Administration Guide p.77:
Traffic is not monitored or inspected between the LAN ports of a switch.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Does that mean I have a firewall that cannot monitor internal packets or block unwanted connection between different objects in the network ? sounds a basic request for such expensive SMB, no ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Of course that is possible if the SMB is configured appropriately ! Did you read Quantum Spark 1500, 1600 and 1800 Appliance Series R80.20.30 Locally Managed Administration Guide p.77 as i suggested ? Next sentence after the one cited is:
Configure multiple bridges between interfaces. Traffic in a bridge is always monitored and inspected by the appliance.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Only if the traffic is routed, not switched. By default, internal interfaces are configured as a switch. If you segment your internal network, and each internal interface will be connected to a different segment, while the appliance is routing from one segment to another, then yes, you can use filtering rules for internal networks.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Depending on the specific use case you also have the following Advanced option where relevant.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That looks interesting indeed. will try that (have to admit I was missing that :))
Thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Tried to change it to true, but rule was not caught. Need to restart anything ?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Once again, these options only work on a routed, not switched traffic. Also, deep inspection means IPS and other advanced blades are applied on routed LAN traffic on top of the regular network security rule base, which is not enabled by default, to save on performance.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Understood, i was more looking for a rule based actions. So i will need to create vlans or separate the network so it goes to a different port in the firewall , right ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In it's simplest form the source & destination would normally be different subnets.
