SEC350‐4.1 - ConnorEast/Tech-Journal GitHub Wiki
Steps | Command | Reasoning/images |
---|---|---|
Step 1: | configure | |
Step 2: | set zone-policy zone WAN interface eth0 | |
Step 3: | set zone-policy zone DMZ interface eth1 | |
Step 4: | set zone-policy zone LAN interface eth2 | |
Step 5: | Commit Save | |
Step 6: | set firewall name WAN-to-DMZ default-action drop | |
Step 7: | set firewall name DMZ-to-WAN default-action drop | |
Step 8: | set firewall name WAN-to-DMZ enable-default-log | |
Step 9: | set firewall name DMZ-to-WAN enable-default-log | |
Step 10: | set zone-policy zone WAN from DMZ firewall name DMZ-to-WAN | |
Step 11: | set zone-policy zone DMZ from WAN firewall name WAN-to-DMZ | |
Step 12: | commit save | |
Step 1: | Ping 172.16.50.3 |
![]() |
Step 12: | Attempt to access http site 172.16.50.3 |
![]() |
Step 11: | Run the "tail -f /var/log/messages | grep WAN" | Do this before you ping in order to recieve log data. |

Steps | Command | Reasoning/images |
---|---|---|
Step 3: | set firewall name WAN-to-DMZ rule 10 action 'accept' | |
Step 1: | set firewall name WAN-to-DMZ rule 10 destination address '172.16.50.3' | |
Step 2: | set firewall name WAN-to-DMZ rule 10 destination port 80 | |
Step 3: | set firewall name WAN-to-DMZ rule 10 protocol tcp | |
Step 4: | set firewall name WAN-to-DMZ rule 10 description "access to web" |

Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set firewall name DMZ-to-WAN rule 1 action accept | |
Step 2: | set firewall name DMZ-to-WAN rule 1 state establish 'enable' |

DMZ and LAN
Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set firewall name LAN-to-DMZ default-action drop | |
Step 2: | set firewall name DMZ-to-LAN default-action drop | |
Step 3: | set firewall name LAN-to-DMZ enable-default-log | |
Step 4: | set firewall name DMZ-to-LAN enable-default-log | |
Step 5: | set zone-policy zone LAN from DMZ firewall name DMZ-to-LAN | |
Step 6: | set zone-policy zone DMZ from LAN firewall name LAN-to-DMZ |



Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set firewall name DMZ-to-LAN rule 10 action accept | |
Step 2: | set firewall name DMZ-to-LAN rule 10 destination address 172.16.200.10 | |
Step 3: | set firewall name DMZ-to-LAN rule 10 destination port 1512,1515 | |
Step 4: | set firewall name DMZ-to-LAN rule 10 protocol tcp | |
Step 5: | set firewall name LAN-to-DMZ rule 1 action accept | |
Step 6: | set firewall name LAN-to-DMZ rule 1 establish enable | |
Step 7: | commit | |
Step 1: | save |

Configure LAN-to-WAN
set firewall name LAN-to-WAN default-action dropSteps | Command | Reasoning/images |
---|---|---|
Step 1: | ||
Step 2: | set firewall name LAN-to-WAN enable-default-log | |
Step 3: | set firewall name LAN-to-WAN rule 1 action accept | |
Step 4: | set zone-policy zone WAN from LAN firewall name LAN-to-WAN |
Configure WAN-to-LAN

Step 1: | set firewall name WAN-to-LAN default-action drop | |
Step 2: | set firewall name WAN-to-LAN enable-default-log | |
Step 3: | set firewall name WAN-to-LAN rule 10 state established enable | |
Step 4: | set firewall name WAN-to-LAN rule 10 action accept | |
Step 5: | set firewall name WAN-to-LAN rule 10 state related enable | |
Step 6: | set zone-policy zone LAN from WAN firewall name WAN-to-LAN |

Configure [LAN to DMZ] & [DMZ to LAN] Firewall rules
Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set firewall name LAN-to-DMZ rule 10 action accept | |
Step 2: | set firewall name LAN-to-DMZ rule 10 source address 172.16.150.0/24 | |
Step 3: | set firewall name LAN-to-DMZ rule 10 destination address 172.16.50.3 | |
Step 4: | set firewall name LAN-to-DMZ rule 10 protocol tcp | |
Step 5: | set firewall name LAN-to-DMZ rule 10 destination port 80,443 | |
Step 6: | set firewall name LAN-to-DMZ rule 20 action accept | |
Step 7: | set firewall name LAN-to-DMZ rule 20 source address 172.16.150.10 | |
Step 8: | set firewall name LAN-to-DMZ rule 20 destination address 172.16.50.0/29 | |
Step 9: | set firewall name LAN-to-DMZ rule 20 destination port 22 | |
Step 10: | set firewall name LAN-to-DMZ rule 20 protocol tcp | |
Step 11: | commit | |
Step 12: | save | |
Step 11: | set firewall name DMZ-to-LAN rule 1 action accept | |
Step 12: | set firewall name DMZ-to-LAN rule 1 state establish enable | |
Step 11: | set firewall name DMZ-to-LAN rule 1 state related enable | |
Step 12: | save |



Configure [Lan to MGMT] Firewall rules
Prerequisits
Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set zone-policy zone LAN interface eth0 | |
Step 2: | set zone-policy zone MGMT interface eth1 |
Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set firewall name LAN-to-MGMT default-action drop | |
Step 2: | set firewall name LAN-to-MGMT enable-default-log | |
Step 3: | set firewall name LAN-to-MGMT rule 1 action accept | |
Step 4: | set firewall name LAN-to-MGMT rule 1 state established enable | |
Step 5: | set firewall name LAN-to-MGMT rule 10 action accept | |
Step 6: | set firewall name LAN-to-MGMT rule 10 destination address 172.16.200.10 | |
Step 7: | set firewall name LAN-to-MGMT rule 10 destination port 1514,1515 | |
Step 8: | set firewall name LAN-to-MGMT rule 10 protocol tcp | |
Step 9: | set firewall name LAN-to-MGMT rule 20 action accept | |
Step 10: | set firewall name LAN-to-MGMT rule 20 destination address 172.16.200.10 | |
Step 11: | set firewall name LAN-to-MGMT rule 20 destination port 443 | |
Step 12: | set firewall name LAN-to-MGMT rule 20 protocol tcp | |
Step 13: | set zone-policy zone MGMT from LAN firewall name LAN-to-MGMT |
Configure [MGMT to LAN] Firewall rules
Steps | Command | Reasoning/images |
---|---|---|
Step 1: | set firewall name MGMT-to-LAN default-action drop | |
Step 2: | set firewall name MGMT-to-LAN enable-default-log | |
Step 3: | set firewall name MGMT-to-LAN rule 1 action accept | |
Step 4: | set firewall name MGMT-to-LAN rule 1 established enable | |
Step 5: | set firewall name MGMT-to-LAN rule 10 action accept | |
Step 6: | set firewall name MGMT-to-LAN rule 10 destination address 172.16.150.0/24 | |
Step 7: | set firewall name MGMT-to-LAN rule 20 action accept | |
Step 8: | set firewall name MGMT-to-LAN rule 20 destination address 172.16.50.0/29 | |
Step 9: | set zone-policy zone LAN from MGMT firewall name MGMT-to-LAN | |
Step 10: | commit | |
Step 11: | save | |
Step 12: | sudo contrack -F | Flushes connections for proper connection. Do this on both firewalls |
Step 13: | sudo reboot |









Fw-MGMT | FW01 |
---|---|
|
|