hello Hannibal
How can i explain or share the logs , let me brief you what happen actually my concern is when i used VRRP on vyos firewall my security policy is stop working which means if i want to allow any port related policy for any server which is behind the firewall , that port is globally open even i allowed it on some specific IPs only
so my policy is not working after configure VRRP which hampered my server behind the firewall . if i want to allow remote access on some specific IPs , that policy is not working and my server remote is accessible globally.
i dont know what should i need to configure now
below are my VRRP and Firewall configuration .
set high-availability vrrp group Green_interface interface ‘eth2’
set high-availability vrrp group Green_interface priority ‘100’
set high-availability vrrp group Green_interface rfc3768-compatibility
set high-availability vrrp group Green_interface virtual-address ‘10.10.0.1/16’
set high-availability vrrp group Green_interface vrid ‘49’
set high-availability vrrp group Red_interface interface ‘eth1’
set high-availability vrrp group Red_interface priority ‘100’
set high-availability vrrp group Red_interface rfc3768-compatibility
set high-availability vrrp group Red_interface virtual-address ‘103.109.63.24/24’
set high-availability vrrp group Red_interface vrid ‘49’
set high-availability vrrp sync-group VRRP_GROUP_49 member ‘Green_interface’
set high-availability vrrp sync-group VRRP_GROUP_49 member ‘Red_interface’
Codes: S - State, L - Link, u - Up, D - Down, A - Admin Down
Interface IP Address S/L Description
eth0 172.17.23.49/16 u/u BLUE Management Network
eth1 192.2.49.1/24 u/u RED Public Network
eth1v49 103.109.63.24/24 u/u
eth2 10.10.0.2/16 u/u GREEN Lan Network
eth2v49 10.10.0.1/16 u/u
lo 127.0.0.1/8 u/u
::1/128
vtun0 10.34.1.1/24 u/u
vtun1 10.34.2.1/24 u/u
###############################################################
Firewall Default configuration 
set firewall name FIREWALL_IN default-action ‘drop’
set firewall name FIREWALL_IN rule 1 action ‘accept’
set firewall name FIREWALL_IN rule 1 description ‘Establiched Connections’
set firewall name FIREWALL_IN rule 1 state established ‘enable’
set firewall name FIREWALL_IN rule 1 state related ‘enable’
set firewall name FIREWALL_IN rule 2 action ‘accept’
set firewall name FIREWALL_IN rule 2 description ‘PING Incoming’
set firewall name FIREWALL_IN rule 2 destination address ‘0.0.0.0/0’
set firewall name FIREWALL_IN rule 2 protocol ‘icmp’
set firewall name FIREWALL_IN rule 2 source address ‘0.0.0.0/0’
set firewall name FIREWALL_OUT default-action ‘drop’
set firewall name FIREWALL_OUT rule 1 action ‘accept’
set firewall name FIREWALL_OUT rule 1 description ‘Established Connections’
set firewall name FIREWALL_OUT rule 1 state established ‘enable’
set firewall name FIREWALL_OUT rule 1 state related ‘enable’
set firewall name FIREWALL_OUT rule 2 action ‘accept’
set firewall name FIREWALL_OUT rule 2 description ‘DNS Outgoing’
set firewall name FIREWALL_OUT rule 2 destination port ‘53’
set firewall name FIREWALL_OUT rule 2 protocol ‘udp’
set firewall name FIREWALL_OUT rule 3 action ‘accept’
set firewall name FIREWALL_OUT rule 3 description ‘PING Outgoing’
set firewall name FIREWALL_OUT rule 3 destination address ‘0.0.0.0/0’
set firewall name FIREWALL_OUT rule 3 protocol ‘icmp’
set firewall name FIREWALL_OUT rule 3 source address ‘0.0.0.0/0’
set firewall name FIREWALL_OUT rule 4 action ‘accept’
set firewall name FIREWALL_OUT rule 4 description ‘TCP Outgoing’
set firewall name FIREWALL_OUT rule 4 destination address ‘0.0.0.0/0’
set firewall name FIREWALL_OUT rule 4 protocol ‘tcp’
set firewall name FIREWALL_OUT rule 4 source address ‘0.0.0.0/0’
set interfaces ethernet eth1 firewall in name ‘FIREWALL_IN’
set interfaces ethernet eth2 firewall out name ‘FIREWALL_OUT’
set nat source rule 9999 outbound-interface ‘any’
set nat source rule 9999 protocol ‘all’
set nat source rule 9999 source address ‘10.10.0.0/16’
set nat source rule 9999 translation address ‘masquerade’
###########################################################
Port restriction policy which is not working after VRRP configuration
set firewall name FIREWALL_IN rule 32 action ‘accept’
set firewall name FIREWALL_IN rule 32 description ‘wsrv109’
set firewall name FIREWALL_IN rule 32 destination address ‘10.10.1.109’
set firewall name FIREWALL_IN rule 32 destination port ‘RDP’
set firewall name FIREWALL_IN rule 32 log ‘disable’
set firewall name FIREWALL_IN rule 32 protocol ‘tcp’
set nat destination rule 32 description ‘DNAT for wsrv109 - RDP’
set nat destination rule 32 destination address ‘103.109.63.24’
set nat destination rule 32 destination port ‘3389’
set nat destination rule 32 inbound-interface ‘any’
set nat destination rule 32 protocol ‘tcp’
set nat destination rule 32 translation address ‘10.10.1.109’
set firewall group address-group wsrv-Restriction
set firewall name FIREWALL_IN rule 32 source group address-group ‘wsrv-Restriction’
set firewall group address-group wsrv-Restriction address ‘103.25.107.56’