Auto-update blog content from Obsidian: 2025-10-15 19:27:09
All checks were successful
Blog Deployment / Check-Rebuild (push) Successful in 6s
Blog Deployment / Build (push) Has been skipped
Blog Deployment / Deploy-Staging (push) Successful in 10s
Blog Deployment / Test-Staging (push) Successful in 2s
Blog Deployment / Merge (push) Successful in 6s
Blog Deployment / Deploy-Production (push) Successful in 9s
Blog Deployment / Test-Production (push) Successful in 2s
Blog Deployment / Clean (push) Has been skipped
Blog Deployment / Notify (push) Successful in 2s

This commit is contained in:
Gitea Actions
2025-10-15 19:27:09 +00:00
parent 064c5d6533
commit 13b9b0810a

View File

@@ -173,4 +173,7 @@ Basically I have 2 kinds of networks, those which I trust, and those which I don
Globally, on my untrusted networks, I will allow access to the DNS and to the internet. On the other hand, my trusted networks would have the possibility to reach other VLANs. Globally, on my untrusted networks, I will allow access to the DNS and to the internet. On the other hand, my trusted networks would have the possibility to reach other VLANs.
To begin I create an alias, in `Firewall` > `Aliases`, to regroup all my internal networks To begin, in `Firewall` > `Groups`, I create two groups to regroup my interfaces:
- **Trusted**: *Mgmt*, *User*
- **Untrusted**: *IoT*, *Lab*, *DMZ*
I create an alias, in `Firewall` > `Aliases`, to regroup all my internal networks