- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands - CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround - CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check - NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere - MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates - LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference Co-authored-by: Cursor <cursoragent@cursor.com>
5.1 KiB
UDM Pro Routing Diagnosis - Complete Analysis
Last Updated: 2026-01-14
Status: ✅ Routing Working - Device Firewall Likely Blocking
Gateway Ping Test Results
Test: Ping VLAN 11 Gateway from Default Network
ping -c 3 192.168.11.1
Result: ✅ SUCCESS
- 3 packets transmitted, 3 received
- 0% packet loss
- Average RTT: 2.36ms
Analysis
✅ UDM Pro IS Routing Correctly
- Traffic from
192.168.0.0/24can reach192.168.11.1 - Routing path is functional
- Network isolation is NOT blocking (at gateway level)
❌ Device at 192.168.11.10 is NOT Reachable
- Cannot ping
192.168.11.10from192.168.0.0/24 - Gateway is reachable, but device is not
Root Cause Analysis
Most Likely Cause: Device Firewall
The device at 192.168.11.10 likely has a firewall that:
- ✅ Allows traffic from same subnet (
192.168.11.0/24) - ❌ Blocks traffic from different subnets (
192.168.0.0/24)
Common Firewall Configurations:
- Windows Firewall: May block traffic from "untrusted" networks
- Linux iptables: May have rules blocking inter-subnet traffic
- Application Firewalls: May restrict access by source IP range
Verification Checklist
✅ Confirmed Working
- UDM Pro routing between networks
- Gateway (192.168.11.1) is reachable
- Network isolation is NOT blocking at gateway level
- Zone policies allow Internal → Internal traffic
⚠️ Still Need to Verify
- Network Isolation toggle on MGMT-LAN (should be unchecked)
- Zone Matrix: Internal → Internal = "Allow All"
- CyberSecure settings (no blocking rules)
- Device firewall on 192.168.11.10
Solutions
Solution 1: Configure Device Firewall (Recommended)
For Windows:
- Open Windows Firewall
- Go to "Inbound Rules"
- Find rules blocking ICMP or your application
- Modify to allow traffic from
192.168.0.0/24 - Or create new rule allowing
192.168.0.0/24→192.168.11.10
For Linux:
# Allow traffic from Default network
sudo iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT
# Or for specific service
sudo iptables -A INPUT -s 192.168.0.0/24 -p tcp --dport <port> -j ACCEPT
For Application Firewalls:
- Check application-specific firewall settings
- Add
192.168.0.0/24to allowed source IPs
Solution 2: Verify Network Isolation (Just to be Sure)
- Navigate: Settings → Networks → MGMT-LAN
- Scroll to "Network" section
- Ensure "Isolate Network" is UNCHECKED
- Save if changed
- Wait 30 seconds
- Test again:
ping 192.168.11.10
Solution 3: Check Zone Matrix
- Click Grid icon (Policy Engine) in sidebar
- Verify: Internal → Internal = "Allow All"
- If not, click cell and change to "Allow All"
- Save changes
- Test again
Solution 4: Check CyberSecure
- Click Shield icon (CyberSecure) in sidebar
- Check for rules blocking "lateral movement"
- Check "Security Posture" mode
- If restrictive, consider adjusting or waiting 15 minutes for propagation
Testing Procedure
Step 1: Test Gateway (✅ Already Passed)
ping -c 3 192.168.11.1
Expected: ✅ Success (confirmed)
Step 2: Test Device (Current Issue)
ping -c 3 192.168.11.10
Current: ❌ Fails After Fix: Should succeed
Step 3: Test from Device Itself
If you have access to the device at .10:
# From 192.168.11.10
ping -c 3 192.168.0.1 # UDM Pro on Default network
ping -c 3 192.168.0.23 # Source device
Step 4: Test Specific Service
If ping works but service doesn't:
# Test specific port (e.g., SSH on port 22)
nc -zv 192.168.11.10 22
# Or telnet
telnet 192.168.11.10 22
Device-Specific Troubleshooting
If Device is Proxmox Host
Check Proxmox Firewall:
# On Proxmox host (192.168.11.10)
pve-firewall status
# Check rules
cat /etc/pve/firewall/cluster.fw
cat /etc/pve/firewall/host.fw
Allow Default Network:
# Add rule to allow 192.168.0.0/24
# Edit firewall rules via Proxmox web UI or CLI
If Device is Windows Server
Check Windows Firewall:
- Open "Windows Defender Firewall with Advanced Security"
- Check "Inbound Rules"
- Look for rules blocking ICMP or your service
- Modify or create rule allowing
192.168.0.0/24
If Device is Linux Server
Check iptables:
sudo iptables -L -n -v
# Look for rules blocking 192.168.0.0/24
# Add allow rule if needed
Check firewalld (if using):
sudo firewall-cmd --list-all
# Add rule to allow 192.168.0.0/24
sudo firewall-cmd --add-source=192.168.0.0/24 --permanent
sudo firewall-cmd --reload
Summary
Status: ✅ Routing is Working Correctly
Issue: Device at 192.168.11.10 is blocking traffic from 192.168.0.0/24
Solution: Configure device firewall to allow traffic from Default network
Next Steps:
- Check device firewall on
192.168.11.10 - Add rule allowing
192.168.0.0/24 - Test connectivity:
ping 192.168.11.10 - Verify Network Isolation toggle (just to be thorough)
- Check Zone Matrix (should already be "Allow All")
Last Updated: 2026-01-14