Hi Good Sir,
I will have a look at your rules FW rules as the vlan config seems pretty solid.
Nothing major found yet.....
(1) Dont see why you need this rule???
add action=accept chain=input comment="Allow LAN NTP queries" dst-port=123 \
in-interface-list=LAN protocol=udp
I have NTP setup up as per below and don't have any such rule in my input chain???
/system ntp client
set enabled=yes server-dns-names=time.nrc.ca,time,nrc.chu.ca
(2) add action=drop chain=forward comment="prevent SPAM" dst-port=25 \
in-interface-list=LAN out-interface-list=WAN protocol=tcp.
I would do this slightly differently
BUT ONLY IF YOU DO NOT USE PORT 25 for anything else!!!
Same rule but in raw firewall rules......
add action=drop chain=prerouting comment="prevent SPAM" dst-port=25 \
protocol=tcp. This would stop cold any traffic heading for port 25 in any direction to/from and across the router.
(3) This rule is confusing to me.......... its wide open.....
add action=accept chain=forward comment="SONOS: forward Multicast traffic" \
dst-address=239.255.255.250 log-prefix=MultiCast
This allows all traffic coming from the internet and from your lan that is headed to that particular dst-address???
I dont even know where to begin to understand if this is good bad ugly or normal.....
. ?????????????
This may be the source of leakage??
(4) Okay this one allows sonos control traffic to vlan30. Makes sense. Of course in the case of vlan30 to sonos control and sonos control to vlan30.
Return traffic is permitted on the same ports. (thus if let vlan30 hit sonos control on port 1900 the router would allow return traffic to vlan 30 on port 1900 (its established) but it seems that its just a control port and that the sonos control responds on different ports and thats what you are trying to setup??? Iin fact like FTP, established AND related traffic is allowed and thus if the sonos opens up ports to talk back to vlan 30 you may not need this rule. Just not sure how the whole SONOS thing works out. In any case, not the issue right now.
add action=accept chain=forward comment=\
"SONOS: Forward Contoller events from Players" in-interface-list=\
"Sonos Control" log=yes log-prefix=FromPlayer out-interface=vlan30 port=\
3400,3401,3500,4444,4070,5353 protocol=tcp
(5) Lets try to narrow our forward rules a touch to be more accurate. In other words, lets refrain from over use of in-interface-list=LAN
Can you define an interface list for allowed wan? and then just change in-interface-list=LAN with the new list but keep everything else.
add action=accept chain=forward comment=\
"accept Internet Access from \"Allow WAN\"" in-interface-list=LAN \ (modify this line)
out-interface-list=WAN src-address-list=AlllowWAN (keep this line)
(6) Its not clear to me what this rule is trying to accomplish?? Please explain.
add action=accept chain=forward comment="Accept AdminSubnet-> PrivateSubnet" \
dst-address-list=PrivateSubnets in-interface-list=LAN src-address-list=\
AdminSubnet