Security Groups - InterVLAN Routing

Security Groups - InterVLAN Routing

Summary

Your Uplevel Gateway's firewall implements firewall rules that govern traffic flow between security groups (VLANs / subnets) on the LAN.
  1. Devices in Guest are completely isolated and can only reach the Internet
  2. Devices in Boss can reach all other groups
  3. Devices in user-created groups can reach Employees
  4. Devices in Employees can be accessed from Boss and user-created groups

Default Configuration

You can selectively override these defaults using the table below by choosing the checkbox Override Default Inter-Group Firewall Rules.


Click on a cell to change the firewall rule governing traffic flow from a particular group to another group.

Color Legend

  1. Grey N/A boxes designate the Security Group (VLAN) rule can not be changed. This is the Security Group that you are configuring.
  2. Green boxes indicate that traffic is able to flow back and forth between these Security Groups
  3. Red boxes indicate that traffic from this Security Group is not allowed to flow back and forth to other Security Groups


    • Related Articles

    • Configuring Security Groups (VLANs)

      Configuration: To create a new Security Group ensure to chedck the “Enable Multiple Groups” checkbox located at the bottom left of the Portal > Overview Page. The button will appear. Clicking the Add Group button will present you with the following ...
    • Creating Shares and Mapping Windows Network Drives

      Note: These instructions are for a Non-Domain Services (Active Directory) environment. If using the Uplevel Directory Service, drive mapping is automatically done with GPOs on login. Mapped Drives are set at Uplevel Portal > Directory > Mapped Drives ...
    • Using LTE / Mobile Network Modem As Primary or Backup / Failover Connections

      Choosing Hardware: Since the Uplevel Unbox provides Wi-Fi and firewall capabilities, we recommend using a single-purpose modem, which simplifies configuration and reduces the solution cost. In this document, for our examples we use the Netgear 4G LTE ...
    • Best Practices for Managing Client Networks

      Network Security and Equipment Protection Best Practices Overview This document outlines critical best practices for securing network assets and protecting equipment when managing client networks. Following these guidelines helps ensure network ...
    • CIS Level 1 and 2

      Introduction The Center for Internet Security (CIS) benchmarks are a method of specifying a secure baseline configuration for assets. This includes assets of all kinds: servers, workstations, network devices, firewalls, phone systems, etc. ...