Hi Again everyone!
So this is a very basic question. Before anyone has asks, I’ve gone through the documentation provided on the VyOS website but there is still one thing I’m a touch confused on, and that’s related to the local-zone
.
Here is the most minimal configuration I am able to provide.
VyOS Router #1:
set firewall zone LOCAL local-zone
set interfaces ethernet eth0 address 'dhcp'
set interfaces ethernet eth1 address '172.16.91.2/24'
set interfaces ethernet eth2 address '10.91.91.2/24'
set interfaces ethernet eth9 address '10.1.1.1/24'
set interfaces loopback lo
set nat source rule 1 outbound-interface name 'eth0'
set nat source rule 1 source address '0.0.0.0/0'
set nat source rule 1 translation address 'masquerade'
set service config-sync mode 'load'
set service config-sync secondary address '10.1.1.2'
set service config-sync secondary key '123123123123123'
set service config-sync section firewall
set service config-sync section nat
set service config-sync section system time-zone
set system host-name 'vyos'
set system time-zone 'America/Toronto'
VyOS Router #2:
set interfaces ethernet eth1 address '172.16.91.3/24'
set interfaces ethernet eth2 address '10.91.91.3/24'
set interfaces ethernet eth9 address '10.1.1.2/24'
set interfaces loopback lo
set nat source rule 1 outbound-interface name 'eth0'
set nat source rule 1 source address '0.0.0.0/0'
set nat source rule 1 translation address 'masquerade'
set service https api keys id 1 key '123123123123123'
set service https listen-address '10.1.1.2'
set system host-name 'vyos'
set system time-zone 'America/Toronto'
When I enable just a basic zone called “LOCAL” as a local-zone, i can’t figure out a way to allow local traffic, for example config-sync
to function correctly or even a basic ICMP packet between the eth9
interface.
I am using eth9
as an interconnect interface between VyOS routers for config-sync
purposes, and VRRP
as well – i will have VRRP running on interface eth2 and eth1 – i would assume putting those interfaces into their own Zones, if a packet enters that zone for vrrp it should be accepted.
I’ve tried to incorporate the zone based firewall local-zone
with the set firewall ipv4 input filter
and set firewall ipv4 output filter
for locally generated traffic, but doesn’t seem to function as expected.
Any insight on this would be helpful and greatly appreciated!