Jump to:navigation, search
Wiki





























De.png
En.png
Fr.png






Configuration of a bridge in connection with eth interfaces
Last adaptation to the version: 12.6.0
New:
  • Updated to Redesign of the webinterface
notempty
This article refers to a Resellerpreview

11.8 11.7

Access: UTM-IP:Port or UTM-URL:Port
Port as configured at Network / Appliance Settings / Webserver
Default-Port: 11115
i.e.: https://utm.ttt-point.de:11115
Default: https://192.168.175.1:11115
Network Network configuration


Introduction

A bridge (network bridge) connects two physical networks to a common one.
The interfaces connected in this way have an IP and the IP addresses of the connected devices are in the same subnet.
notempty
The firewall must not be administered via the interface that is to be added to a bridge!

The connection to the admin interface is lost as soon as the IP address is removed from the interface currently used to access the UTM.
If all available internal interfaces are to be added to a bridge (e.g. A1 and A2 for a Black Dwarf), external access to the firewall must be via A0.
Port forwarding from an internal network via an external IP address is not possible via a bridge.
This could be remedied by setting up a forward zone in the UTM name server, provided that the UTM is set up as the name server for the internal clients. In this case, the external URL called by Internal refers directly to the internal target server.
Instructions for setting up the forward zone can be found under Forward-Zone in the Nameserver Wiki.


Prepare administration access

  • Identify an interface on the firewall that should not be bridged.
  • In the menu Network Network Configuration  Area Network interfaces IP Addresses note down or assign existing IP address of this interface (e.g. 10.0.10.1/24 or 10.10.10.193/29).
  • Find a free IP address from the corresponding network.
  • Add this IP address or the entire associated network (e.g. 10.0.10.0/24 or 10.10.10.192/29) in the menu Network Server Settings  Area Administration and authorize it for administration.
  • Establish access on the selected interface via this IP address or this network (e.g.: 10.0.10.1:11115 or 10.10.10.193:11115).


Prepare interfaces

Edit Ethernet interfaces UTMuser@firewall.name.fqdnNetworkNetwork configuration UTM v12.6.0 Netzwerkkonfiguration Schnittstellen IP-Adresse-en.pngRemoving IP address

First, remove all IP addresses from the interfaces to be used for the bridge.
Menu Network Network Configuration in the corresponding interface → Tab IP Addresses.
Remove IP addresses. In the example »192.168.100.1/24 by clicking on
Under no circumstances may the IP address be removed which is used for the current access!


UTM v12.6.0 Netzwerkkonfiguration Schnittstellen Zonen-en.png
Remove zones
In the second step, all zones are removed from the interfaces to be used for the bridge.
Menu Network Network Configuration in the corresponding interface → Tab Zones.
Remove the zones by clicking on . In the example »dmz1 »firewall-dmz1.
Then Save.
Under no circumstances may the zone be removed which is used for the current access!


Network configuration UTMuser@firewall.name.fqdnNetwork UTM v12.6.0 Netzwerkkonfiguration Schnittstellen eth-en.png
Fig.1
Initial position interfaces
Network configuration UTMuser@firewall.name.fqdnNetwork UTM v12.6.0 Netzwerkkonfiguration eth Schnittstellen nacher-en.png
Fig.2
Prepared interfaces















Create a Bridge

In the example, the interfaces A1 and A2 are to be combined to a DMZ.
Start the wizard in the menu Network Network Configuration  Area Network interfaces Button + Bridge.

Step 1

Step 1
Caption Value Description Add interface UTMuser@firewall.name.fqdnNetworkNetwork configuration UTM v12.6.0 Netzwerkkonfiguration Bridge hinzufügen S1-en.pngAssistant step 1
Name: bridge0 Name of the bridge interface
IP address: 10.50.50.1/24 Example-IP address of the bridge interface
STP: Off In addition, the Spanning Tree Protocol can be activated.
The Spanning Tree Protocol prevents parallel connections in networks with multiple switches and thus avoids unwanted circular packets
  .
STP Bridge Priority: 32768Link=
Continue Next step

Step 2

Step 2
Interfaces: »A1 »A2 Interfaces that are to be combined. Available interfaces can be selected in the click box. UTM v12.6.0 Netzwerkkonfiguration Ethernet Bridge S2-en.png
Assistant step 2
Continue Next step

Step 3

Step 3
Zones: »dmz1 »firewall-dmz1 Zones that are to be linked with the bridge interface.
In our example dmz1 and firewall-dmz1.
UTM v12.6.0 Netzwerkkonfiguration Bridge hinzufügen S3-en.png
Assistant step 3
Add new zone: Off dmz2 If activated, a new zone can be added to the bridge alternatively or additionally.
Generate Rules: Off Packetfilter rules are automatically created for the new zone.
These rules first allow any network traffic of the bridge to the internet (any rules) and must be replaced unconditionally by customized rules!
Update associated network objects: On If activated, all network objects whose zone is assigned to another interface and which have specified an interface as the target are now assigned the new bridge as the target.
Finish Completes the bridge setup.
Configured bridge Network configuration UTMuser@firewall.name.fqdnNetwork UTM v12.6.0 Netzwerkkonfiguration fertig ethernet bridge-en.pngConfigured bridge


Set up packetfilter rule

A packetfilter rule is required to allow network traffic between the interfaces belonging to the bridge.
A new network object is created for this purpose.

Caption Value Description Add network object UTMuser@firewall.name.fqdnFirewallNetwork objects UTM v12.6.0 Firewall Netzwerkobjekte hinzufügen dmz bridge-en.png
Name: all-dmz Choose any name
Type: Network (address)
Address: 0.0.0.0/24 Any network traffic should be possible.
The restriction is made by specifying the zone.
Zone: dmz1 Zone linked to the bridge.


Add Rule UTMuser@firewall.name.fqdnFirewallPacketfilter UTM v12.6.0 Firewall Paketfilter all-dmz bridge-en.pngPacketfilter rule for the bridge

Finally, only the packetfilter rule with the network object just created has to be created.
At this point a any-rule may actually be used so that the interfaces can communicate completely with each other.
# Source Destination Service NAT Action Active
Dragndrop.png 4 World.svg all-dmz World.svg all-dmz Other.svg any Accept On



Network traffic to other networks (internal or external) should then be restricted by rules that work with the network objects that are mapped to the bridge zone.


Example rule to release only ftp services from the DMZ

# Source Destination Service NAT Action Active
Dragndrop.png 4 Network.svg dmz1-network World.svg internet Tcp.svg ftp HNE Accept On

The bridge setup is completed with .