Hi!
I cannot for the life of me allow any incoming connection from WAN to LAN1 (or anything for that matter) on a zyxel USG50,
it will always catch the default rule, and block it.
notice Firewall Match default rule, DROP [count=2] 81.240.92.189:52715 80.201.175.91:21 ACCESS BLOCK
here's the rules, from ssh (show firewall any any):
firewall rule: 1
description:
user: any, schedule: none
from: WAN, to: LAN1
source IP: any, source port: any
destination IP: PC1, service: FTP
log: log, action: allow, status: yes
connection match: no
firewall rule: 2
description:
user: any, schedule: none
from: LAN1, to: any
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 3
description:
user: any, schedule: none
from: LAN2, to: any
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 4
description:
user: any, schedule: none
from: DMZ, to: WAN
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 5
description:
user: any, schedule: none
from: IPSec_VPN, to: any
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 6
description:
user: any, schedule: none
from: SSL_VPN, to: any
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 7
description:
user: any, schedule: none
from: TUNNEL, to: any
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 8
description:
user: any, schedule: none
from: LAN1, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 9
description:
user: any, schedule: none
from: LAN2, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 10
description:
user: any, schedule: none
from: DMZ, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: Default_Allow_DMZ_To_ZyWALL
log: no, action: allow, status: yes
connection match: no
firewall rule: 11
description:
user: any, schedule: none
from: WAN, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: Default_Allow_WAN_To_ZyWALL
log: no, action: allow, status: yes
connection match: no
firewall rule: 12
description:
user: any, schedule: none
from: IPSec_VPN, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 13
description:
user: any, schedule: none
from: SSL_VPN, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
firewall rule: 14
description:
user: any, schedule: none
from: TUNNEL, to: ZyWALL
source IP: any, source port: any
destination IP: any, service: any
log: no, action: allow, status: yes
connection match: no
↧