NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
fred339
Dec 02, 2016Tutor
Allow VPN connections
I am trying to set up a WNR1500 to allow VPN connections. I need to OPEN ports, 443, 500, etc. to the entire LAN subnet. It appears that all of the settings for Blocking Services, UPNP, DMZ are...
ElaineM
Dec 05, 2016NETGEAR Employee Retired
Welcome to the community, fred339
Unfortunately, it's not possible to set a range of LAN IP's to open those port numbers.
fred339
Dec 30, 2016Tutor
Thanks for the reply.
Can anyone explain WHY this is done this way?
It seems a limitation in the design intended to thwart untoward actions by people who shouldn't be messing with these settings in the first place.
It results in preventing people who know what they're doing from getting useful things done.
How can that be fed back?
To be fair, I've found some Cisco devices that are the same way!
Arghhhh
- ElaineMJan 03, 2017NETGEAR Employee Retired
Home routers are not designed to handle such connection.
You are looking for a router that is designed to be a VPN server.
- StephenBJan 03, 2017Guru - Experienced User
fred339 wrote:
Can anyone explain WHY this is done this way?
You are talking about the port forwarding feature in a NAT router. All unsolicited inbound traffic will have the same destination IP address. How does router know which local IP address to forward those packets to? Short answer: it can't.
If there were no NAT and the clients all had public addresses it would be different. Then you'd have a firewall edge router, and you could set up rules like the ones you have in mind.
If the goal is to set up a VPN client connection to the local network, you either need a router that has that built in, or a VPN server. If you have a server, then then ports are forwarded to that server. In the other direction, VPN connections from the local network outbound should just work.
- fred339Jan 05, 2017Tutor
It seems that the answers I'm getting aren't quite about what I was asking.
First, I wasn't talking about port forwarding. Admittedly it's similar but it's not the same thing. Nor is this about VPN-capable routers (as an end point).
The question was about firewall rules.
Inbound traffic would surely have the same public IP addresses or they wouldn't be "inbound". So that much is obvious.
However, the same inbound traffic will have multiple port addresses.
One port address is used to translate in the NAT into an internal IP address AND port - so that's how the router knows.
Consider instantiating two browsers on the same computer. Each one will have its own source port which is what would be used for responses. Each one will have a destination port which will be the same (e.g. port 80).
But these details aren't the issue. I don't care how incoming packets were formed. I only care how they will be handled.
Let's start with 192.168.1.99 source port 5555 and destination IP 123.234.123.234 and destination port 6666.
Assume the router has a public IP of 234.234.234.234.
Assume that the outgoing firewall rules are ALLOW ANY
The NAT will assign a new port number for 192.168.1.99:5555 that is 234.234.234.234.234:xxxx with the destination IP and port unchanged.
The response from 123.234.123.234 will be perhaps source IP 123.234.123.234:6666 and destination 234.234.234.234:xxxx
IF the incoming firewall rules allow, The Nat will forward this packet to 192.168.1.99:5555.
There is no EXPLICIT port forwarding setup here. It's automatic.
And, I suppose one might add: If there is stateful packet inspection then there has to be a match with information taken from the outgoing packet.
And, stateful packet inspection would be part of the incoming firewall rules.
Perhaps it will be clearer if I note:
Port forwarding (whether with translation or not) is intended to forward incoming packets to a designated internal IP address. Right?
And, firewall rules, are intended to pass packets or block them but not direct them as in port forwarding. Right?
My concern is the functionality of explicit firewall rules. That is, rules that are set by an administrator.
So, I note that:
1) some routers have traditionally allowed firewall rules that pertain to (i.e. ALLOW or BLOCK) destination port numbers and apply to a RANGE of internal IP addresses).
and
2) More recently, I see that some routers DO NOT ALLOW a RANGE of internal IP addresses in the firewall rules. (Of course, usually the rules are ALLOW because otherwise the default is usually BLOCK).
What this means is that the latter can only ALLOW traffic with a particular destination port to go to a single internal IP address.
[AND NOT to ANY internal IP address as in (1) above].
Perhaps this is why there's confusion with port forwarding....
The question is: Why (2) instead of (1)??? What's the rationale?
- StephenBJan 06, 2017Guru - Experienced User
fred339 wrote:
My concern is the functionality of explicit firewall rules. That is, rules that are set by an administrator.
Thanks, this explanation clarifies your question. The settings do vary by router model, and I'm not seeing much beyond port forwarding in the manual for your WNR1500 either.
My r8500 does let me create services with destination port ranges and IP address ranges, and to block those services on a schedule. I'm not sure if these are outbound rules or bidirectional (overriding forwarding for example) - the documentation doesn't say (and it's not a feature I'm using). I haven't ever seen configurable firewall rules that specify inbound/outbound on a Netgear home router.
As far as I am aware, the built-in rules permit outbound traffic to any destination port, and inbound return traffic on that connection is automatically forwarded back to the local sending device as you describe. Though I haven't tested the return path lately with UDP. Unless I'm misunderstanding, that would mean all ports are OPEN to the full subnet by default (going back to your original post).
Is that not happening with your WNR1500?