Files
proxmox/docs/04-configuration/UDM_PRO_FIREWALL_MANUAL_CONFIGURATION.md
defiQUG fbda1b4beb
Some checks failed
Deploy to Phoenix / deploy (push) Has been cancelled
docs: Ledger Live integration, contract deploy learnings, NEXT_STEPS updates
- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands
- CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround
- CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check
- NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere
- MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates
- LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference

Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-12 15:46:57 -08:00

6.2 KiB

UDM Pro Firewall Manual Configuration Guide

Last Updated: 2025-01-20
Status: Active Documentation Purpose: Manual configuration guide for firewall rules that cannot be automated via API


Overview

This guide provides step-by-step instructions for configuring firewall rules via the UniFi Network web interface. Some firewall rules (particularly those with overlapping source/destination networks) cannot be automated via the API and require manual configuration.


Accessing Firewall Configuration

  1. Open web browser and navigate to: https://192.168.0.1
  2. Log in with your admin account
  3. Navigate to SettingsFirewall & SecurityFirewall Rules (or Traffic Rules)

Sovereign Tenant Isolation (VLANs 200-203)

Goal

Block east-west traffic between sovereign tenant VLANs (200-203) to ensure complete isolation between tenants.

Configuration Steps

  1. Navigate to Firewall Rules:

    • Go to SettingsFirewall & SecurityFirewall Rules
    • Click Create New Rule or Add Rule
  2. Create Block Rule for Each Pair:

    Since the API doesn't support overlapping network blocks, create individual rules for each direction:

    Rule 1: Block VLAN 200 → VLANs 201-203

    • Name: Block VLAN 200 to Sovereign Tenants
    • Action: Block
    • Protocol: All (or specific protocols as needed)
    • Source Type: Network
    • Source Network: PHX-SOV-SMOM (VLAN 200)
    • Destination Type: Network
    • Destination Networks:
      • PHX-SOV-ICCC (VLAN 201)
      • PHX-SOV-DBIS (VLAN 202)
      • PHX-SOV-AR (VLAN 203)
    • Priority/Order: Set appropriate priority (higher priority = evaluated first)

    Rule 2: Block VLAN 201 → VLANs 200, 202-203

    • Name: Block VLAN 201 to Sovereign Tenants
    • Action: Block
    • Source Network: PHX-SOV-ICCC (VLAN 201)
    • Destination Networks: PHX-SOV-SMOM, PHX-SOV-DBIS, PHX-SOV-AR
    • (Repeat for VLANs 202 and 203)

    Alternative: Create bidirectional rules (if the UI supports it):

    • Block VLAN 200 ↔ VLAN 201
    • Block VLAN 200 ↔ VLAN 202
    • Block VLAN 200 ↔ VLAN 203
    • Block VLAN 201 ↔ VLAN 202
    • Block VLAN 201 ↔ VLAN 203
    • Block VLAN 202 ↔ VLAN 203
  3. Set Rule Priority:

    • Ensure block rules have higher priority than allow rules
    • Block rules should be evaluated before general allow rules
    • Typical priority order:
      1. Block rules (highest priority)
      2. Management access rules
      3. Monitoring rules
      4. Default allow/deny (lowest priority)
  4. Enable Rules:

    • Enable each rule after creation
    • Rules are typically enabled by default when created
  5. Verify Configuration:

    • Review all rules in the firewall rules list
    • Verify rule order/priority
    • Test connectivity between VLANs to confirm isolation

Additional Firewall Rules

Management VLAN Access (if not automated)

If the management VLAN access rules were not created via API, configure manually:

Rule: Allow Management VLAN → Service VLANs

  • Name: Allow Management to Service VLANs
  • Action: Allow
  • Protocol: TCP
  • Source Network: MGMT-LAN (VLAN 11)
  • Destination Networks: All service VLANs
  • Destination Ports: 22 (SSH), 443 (HTTPS), 5432 (PostgreSQL), 8080 (Admin consoles), etc.
  • Priority: Medium (after block rules, before default)

Monitoring Access (if not automated)

Rule: Allow Service VLANs → Management VLAN (Monitoring)

  • Name: Allow Monitoring to Management
  • Action: Allow
  • Protocol: TCP, UDP
  • Source Networks: All service VLANs
  • Destination Network: MGMT-LAN (VLAN 11)
  • Destination Ports: 161 (SNMP), 9090-9091 (Prometheus), etc.
  • Priority: Medium

Rule Priority Guidelines

Firewall rules are evaluated in order of priority. Recommended priority order:

  1. Block Rules (Priority 100-199)

    • Sovereign tenant isolation
    • Other security blocks
    • Highest priority
  2. Management Access (Priority 10-19)

    • Management VLAN → Service VLANs
    • Critical administrative access
  3. Monitoring Access (Priority 20-29)

    • Service VLANs → Management VLAN
    • Monitoring and logging
  4. Default Rules (Priority 1000+)

    • Default allow/deny rules
    • Lowest priority

Verification

After configuring firewall rules:

  1. Review Rule List:

    • Verify all rules are created and enabled
    • Check rule priorities/order
    • Confirm source/destination networks are correct
  2. Test Connectivity:

    • Test connectivity between VLANs that should be blocked
    • Verify blocked VLANs cannot communicate
    • Confirm allowed VLANs can communicate as expected
  3. Monitor Logs:

    • Check firewall logs for blocked connections
    • Verify rules are being applied correctly
    • Monitor for any unexpected blocks

Network IDs Reference

For reference, here are the network IDs for key VLANs:

  • VLAN 11 (MGMT-LAN): 5797bd48-6955-4a7c-8cd0-72d8106d3ab2
  • VLAN 200 (PHX-SOV-SMOM): 581333cb-e5fb-4729-9b75-d2a35a4ca119
  • VLAN 201 (PHX-SOV-ICCC): 6b07cb44-c931-445e-849c-f22515ab3223
  • VLAN 202 (PHX-SOV-DBIS): e8c6c524-b4c5-479e-93f8-780a89b0c4d2
  • VLAN 203 (PHX-SOV-AR): 750d95fb-4f2a-4370-b9d1-b29455600e1b

Troubleshooting

Rules Not Working

  • Check Rule Priority: Ensure block rules have higher priority than allow rules
  • Verify Rule Order: Rules are evaluated top-to-bottom in some interfaces
  • Check Rule Status: Ensure rules are enabled
  • Review Logs: Check firewall logs for blocked/allowed connections

Connectivity Issues

  • Test Each Rule: Disable rules one-by-one to identify problematic rules
  • Check Default Rules: Ensure default allow/deny rules aren't overriding your rules
  • Verify Networks: Confirm source/destination networks are correct
  • Protocol Matching: Ensure protocol filters match the traffic type


Last Updated: 2025-01-20