Geolocation ACL is not working

Geolocation ACL is not working

Geolocation ACL is not working
Geolocation ACL is not working
8 hours ago - last edited 29 minutes ago

Hello, 

I have an OMADA ER7206 V1 1.4.1

 

i am constantly receiving WAN PING ATTACKS from China. 

I have put in an ACL that blocks all protocols from location "china" WAN IN, "Ipgroup-all" and yet I am still receiving the alerts. 

The IP is a fixed line ISP in China, so any networking provider that gives you geo-data on IPs should have it accurate. 

Why would that be? Please let me know how to fix this. 

 

  0      
  0      
#1
Options
1 Accepted Solution
Re:Geolocation ACL is not working -Solution
2 hours ago - last edited 29 minutes ago

  @Domada 

 

I have had success blocking these with location groups, but using this as the acl

WAN IN [location group] > Gateway Management Page
This seems to function as a pre-nat blocker in some way and seems to internally refer to not just the management page, but the entire front internet-facing side of the router.

this seems to block wan in much more thoroughly than,as Mr S said, the wan in > ipgoup/network as in that case the destination is behind NAT 

Recommended Solution
  0  
  0  
#7
Options
5 Reply
Re:Geolocation ACL is not working
5 hours ago

  @Domada 

 

There is something missing on the router ACL, wan/in does not work on the wan interface itself but from wan to lan, port NAT and things like that will be blocked from country. If I compare with e.g. unifi, there is acl for internet local, translated to tp-link, wan local that we need to make this work. For now, there is no way to block access to wan directly, that is, there are some settings under Attack Defense that can block ping. There are still some ACLs missing on the router, strange that it is not prioritized.

 

 

 

 

  1  
  1  
#2
Options
Re:Geolocation ACL is not working
3 hours ago - last edited 4 minutes ago

  @MR.S

 That's bad that you cannot customize the ACL on the wan interface itself. Also, it can potentially have negative impacts on the router DOS 

To reduce the noise I can only disable the notification "gateway detected attack" but that category includes other attacks I want to watch out for if it's occurring in bulk. Unless there is something else I can do. 

  0  
  0  
#4
Options
Re:Geolocation ACL is not working
3 hours ago

  @Domada 

 

basically everything should be blocked on the wan interface so it shouldn't be necessary to block anything, but i use wan local or internet local as it's called on unifi quite a lot to open up for ping ssh or web management to the router from the administration network i have. but location acl with wan/in works pretty well i think. i have blocked the whole world with wan/in and opened up only for my home country,

 

to avoid the warning you can disable this, the router does what it's supposed to and then blocks :-)

 

 

  0  
  0  
#5
Options
Re:Geolocation ACL is not working
2 hours ago

  @MR.S 

Well its two different things, as you are aware the router is receiving the traffic from China, determing it as a WAN ping attack and then dropping it. I should be able to make an ACL which denies all the traffic from China without the router receiving it and reading the traffic. It puts more work on the router to do it the way it is now, hence why I said it can impact performance. I should be able to place an ACL which completely overrides this and requires no need for the router to determine if its a WAN ping attack on WAN interface as you mentioned and simply deny the traffic and not see any alerts. 

I appreciate your response but it's not much of a solution to disable all "Gateway Detected Attack" notifications. Surely, there should be some other way to make it work better. 

Can anybody from TPLink advise? 

  0  
  0  
#6
Options
Re:Geolocation ACL is not working -Solution
2 hours ago - last edited 29 minutes ago

  @Domada 

 

I have had success blocking these with location groups, but using this as the acl

WAN IN [location group] > Gateway Management Page
This seems to function as a pre-nat blocker in some way and seems to internally refer to not just the management page, but the entire front internet-facing side of the router.

this seems to block wan in much more thoroughly than,as Mr S said, the wan in > ipgoup/network as in that case the destination is behind NAT 

Recommended Solution
  0  
  0  
#7
Options