I have a Watchguard Firebox X550e device.
I have added a second 'Trusted' Interface so that an additional network can be used for security cameras and their server.
eth0 External (Internet) Static Public IP Address
eth1 Trusted (Internal LAN) 172.29.199.253/25
eth2 Trusted (Internal Camera Network) 192.168.1.10/24
I have managed to allow access to the Security Camera Server (192.168.1.50/24) from an external source IP without any problems, but I am not able to allow traffic between the 2 Trusted Internal interfaces. I would like to be able to allow Any type of traffic via Any port between the 2 Trusted interfaces. I have created the following policy in an attempt to allow this:
Policy Type = Any
From = Any-Trusted
To = Any-Trusted
This will not allow the Security Camera Server (eth2) to access a device on the Internal LAN Network (eth1) which is what is required.
So... what exactly do I need to do in order to allow the 2 internal networks to communicate as if they were 1?
Any Help will be greatly appreciated! :-)