ACL rule question -between my management computer/network and clients
setup ER605, TL-SG-2008P, EAP615-wall, omada controller software v5 on linux
4 VLANs
1 -management/admin
10-laptops
20-devices like phones
30-raspberry pis
I've noticed the following when setting up rules between my management computer/network and clients (rpi) i need to access:
setting source to IP-port-group and destination to IP-port-group for allowing traffic (bi-directional) between clients (on separate VLANs) such as 22/tcp for ssh doesn't allow the traffic. I have a later rule to deny all traffic between their respective vlan networks. If i set either the mgt computer or client to simply IP-group or network and leave the other at IP-port group then it works fine -traffic gets thru -just not when both are setup for ip-port-group -doesn't matter which one i use for the specific (ip-port-group) or general (ip-group). Not a firewall issue -both firewalls (ufw) are disabled on the clients when testing Am i missing something?
Related, does it make a difference? -is setting the IP-port group more secure on one end or the other? i.e should the admin computer restrict access by IP-port group or should the client? Easy enough to control via the individual firewalls, but just trying to understand omada better.