 ZyWall |
Just the other day, I switched to FIOS from Optimum Online. Pretty much the first thing I did is log on to this site and see what sort of networking configurations people have decided to use. The tech installed a coax line in to the actiontec router. Wanting to use my existing ZyWall 2X router instead of the one provided, I decided to follow the bridging guide: »
Make your actiontec a bridge with VOD working with REV D .
After a few hours of messing with the settings, my ZyWall router was unable to acquire a WAN address. Frustrated, I temporarily disabled the firewall. Within seconds, I had an IP address and everything was working fine. Upon closer analysis of the routers logs, I was able to determine what IP ranges and ports I needed to open in order for my ZyWall 2x router to work through the bridge with the firewall enabled.
This post is aimed at anyone using attempting to bridge the supplied Actiontec router connected to a ZyWall router. I decided to post my findings in order to help anyone stuck in the process.
Before proceeding, let me briefly describe my network configuration. The Actiontec router has a static address at 192.168.100.1, and my network range is 192.168.1.0 - 192.168.1.255.
When I first followed the bridging guide, I had the Actiontec router configured at the address of 192.168.1.1, and the ZyWall at 192.168.1.2. It worked alright, but the ZyWall's logs quickly filled up with "ip spoofing" attack alerts since the Actiontec was on the same subnet. Changing it to a different address solved that problem.
Please refer to the attached picture for the firewall rule created. I'll provide a brief explanation of why I selected the following ranges.
1) First, create a new "WAN to WAN" firewall rule.
2) Under "source address", add the following ranges:
192.168.100.1 (IP of Actiontec router)
173.0.0.0 - 173.255.255.255 (IP range of FIOS)
96.0.0.0 - 96.255.255.255 (IP range of FIOS)
98.0.0.0 - 98.255.255.255 (IP range of FIOS)
192.168.1.0 - 192.168.1.255 (IP range of LAN)
*Note: My IP was initially in the 173.x.x.x range. I did a quick search, and discovered that other IP ranges that some people had were in the 96.x.x.x and 98.x.x.x range. In case I was ever assigned one of those addresses, the rule needed needed to be flexible.
3) Under "destination address", add the following ranges:
255.255.255.255 (Broadcast)
192.168.1.0 - 192.168.1.255 (IP range of LAN)
224.0.0.0 - 239.255.255.255 (Multicast)
4) Under "selected services", add the following ports/protocols:
PING(ICMP:0)
MULTICAST(IGMP:0)
*UPNP(UDP:1900) <--- Custom Rule
*DNS(UDP:67-68) <--- Custom Rule
5) Apply the rule
After applying these settings, the ZyWall 2X was able to acquire an IP address through the bridged Actiontec with the ZyWall's firewall enabled.
If anyone has any questions, comments, or suggested revisions to my firewall rule, I would love to hear them. I hope this has been helpful for anyone trying to configure a similar setup.
Take care,
-- Devsforev