Hello!
Have some questions regarding the Firewall Zone configurations.
I have multiple zones: wan, lan, mgt, guest, srv, dmz.
The dmz zone has public IP-addresses so does not need to be NATed or MASQUERADED to the WAN/Internet. All the other zones are RFC1918 networks and need to be NATed if allowed to go out on the WAN interface. For any internal intra-zone traffic(lan,mgt,srv,guest,dmz) the traffic should NOT be NATed between the zones.
- Traffic between lan,mgt,srv,guest, dmz should NOT be NATed
- The traffic from lan,mgt,srv,guest to WAN should be NATed
- The traffic from dmz to WAN should NOT be NATed
Currently any hosts on dmz gets NATed to the WAN interface when going to the Internet, most likely due to the " wan ⇒ Reject" that has MASQUERADE enabled.
I have difficulties to setup zone rules that accomplish this, was there can not be 2 zone rules with the covered networks=dmz, one with intra zone enabled without NAT and one with dmz->wan with masquerading enabled.
Any tips on how to understand the zone rules better and accomplish the desired setup described above?
Regs,
Kim