NAT rule "allow remote IP" on USG LITE 60AX no subnets?



First go around with the USG LITE 60AX. NAT rules "allow remote IP" doesn't seem to support a subnet, only a single IP (unless I'm doing something wrong). Is the only option to leave it at Any, the create firewall rules to limit allowed inbound subnets? Do NAT rules in this case also implicitly create the matching firewall rules (whether visible or not)? The device seems to have no concept of groups of networks, or groups of services, like it's bigger brothers, so this is going to be a laborious task. Thanks.
All Replies
-
Hi @rustywheelus,
We’ve confirmed the following points:
- “Allow remote IP” currently accepts a single IP address only (subnets/CIDR are not supported).
- Creating a NAT rule on Nebula automatically installs a matching firewall rule in the local device (not visible on the Nebula UI).
- While an approach is to set Allow remote IP = Any and then constrain sources with security policies, we’d like to first understand your scenario to see if there’s a cleaner fit. To provide more precise guidance, could you share a bit about your network topology and the application/usage you’re trying to achieve?
Zyxel Tina
0 -
Very small site with simple /24 network for LAN. Legacy database on internal server at, e.g. 10.9.8.90. Static WAN address of x.x.x.x. Need to allow access from several locations with large range of public IPs. On most any USG device, I'd create a NAT rule: x.x.x.x port 8084 to 10.9.8.90 port 5432. Then a couple network objects that are subnets, say a.a.a.a/28 and b.b.b.b/24, maybe a group G that includes these subnets; finally firewall policy that allows inbound to x.x.x.x port 8084 only from group G.
For future reference on your first two points above, are these limitations or implementations a result of Nebula, or the USG Lite device?
If we do proceed with security policies to constrain sources, how do we know where the (not visible) firewall rule created by the NAT falls in the hierarchy of firewall rules?
Site only has 4 users and a dozen network devices, so USG Lite seemed appropriate, but maybe we just need to use a more suitable model….
Thanks
0
Categories
- All Categories
- 438 Beta Program
- 2.7K Nebula
- 183 Nebula Ideas
- 121 Nebula Status and Incidents
- 6.2K Security
- 449 USG FLEX H Series
- 301 Security Ideas
- 1.6K Switch
- 80 Switch Ideas
- 1.3K Wireless
- 44 Wireless Ideas
- 6.8K Consumer Product
- 276 Service & License
- 434 News and Release
- 88 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 91 Security Highlight