Blog | G5 Cyber Security

Gli-net Firewall Zones: Secure Your Router

TL;DR

This guide shows you how to set up firewall zones on your Gli-net router for better security. We’ll cover creating separate zones for trusted and untrusted networks, setting rules to control traffic between them, and blocking unwanted access.

Understanding Firewall Zones

Firewall zones group network interfaces (like Wi-Fi or Ethernet ports) together with a set of rules that define how traffic is handled. Gli-net routers use this to separate your home network from the internet, guest networks, and other devices.

Step 1: Accessing the Firewall Settings

  1. Log in to your Gli-net router’s web interface. Usually, this is at http://192.168.8.1 (check your router documentation if different).
  2. Navigate to Network > Firewall. You’ll see a list of existing zones and options to create new ones.

Step 2: Creating Zones

Gli-net routers typically have default zones like ‘lan’, ‘wan’, and potentially ‘guest’. You might want to add more.

  1. Click the Add button to create a new zone.
  2. Give your zone a descriptive name (e.g., ‘IoT’, ‘Trusted’).
  3. Select the interfaces that belong to this zone. For example:
    • ‘lan’: Your main home network.
    • ‘wan’: The internet connection.
    • A specific Wi-Fi interface: For a guest network or IoT devices.
  4. Click Save.

Step 3: Setting Zone Rules

This is where you control traffic flow between zones.

  1. In the Firewall settings, find the ‘Zone Forwarding’ or similar section.
  2. For each zone pair (e.g., LAN to WAN), define rules:
    • Source Zone: The network initiating the connection.
    • Destination Zone: The network receiving the connection.
    • Action: What happens to the traffic.
      • Accept: Allow the connection.
      • Drop: Block the connection (silent discard).
      • Reject: Block the connection and send an error message back.
    • Protocol: TCP, UDP, ICMP or All
    • Port Range: Specify ports if you want to allow/block specific services (e.g., 80 for HTTP, 443 for HTTPS). Use ‘Any’ to apply the rule to all ports.

Step 4: Recommended Zone Rules

Here are some common rules for better security:

  1. LAN to WAN: Generally, allow outbound connections (Accept) but block inbound connections (Drop or Reject). This lets your devices access the internet but prevents unsolicited connections from outside.
    Source Zone: LAN
    Destination Zone: WAN
    Action: Accept
    Protocol: All
    Port Range: Any
  2. WAN to LAN: Block all inbound connections (Drop or Reject). This is crucial for preventing attacks from the internet.
    Source Zone: WAN
    Destination Zone: LAN
    Action: Drop
    Protocol: All
    Port Range: Any
  3. LAN to Guest: Block all connections (Drop or Reject) unless you specifically need access between them. This isolates your guest network.
    Source Zone: LAN
    Destination Zone: Guest
    Action: Drop
    Protocol: All
    Port Range: Any
  4. Guest to LAN: Block all connections (Drop or Reject) unless you specifically need access between them. This isolates your guest network.
    Source Zone: Guest
    Destination Zone: LAN
    Action: Drop
    Protocol: All
    Port Range: Any
  5. IoT to LAN: Block all connections (Drop or Reject) unless you specifically need access between them. This isolates your IoT network.
    Source Zone: IoT
    Destination Zone: LAN
    Action: Drop
    Protocol: All
    Port Range: Any
  6. IoT to WAN: Allow outbound connections (Accept) but block inbound connections (Drop or Reject). This lets your devices access the internet but prevents unsolicited connections from outside.
    Source Zone: IoT
    Destination Zone: WAN
    Action: Accept
    Protocol: All
    Port Range: Any

Step 5: Applying and Testing

  1. Click Apply or Save to activate your firewall rules.
  2. Test connectivity from different zones to ensure the rules are working as expected. Try pinging devices across zone boundaries.

Important Considerations for cyber security

Exit mobile version