Files
proxmox/docs/archive/configuration/OMADA_CLOUD_CONTROLLER_FIREWALL_GUIDE.md
defiQUG cb47cce074 Complete markdown files cleanup and organization
- Organized 252 files across project
- Root directory: 187 → 2 files (98.9% reduction)
- Moved configuration guides to docs/04-configuration/
- Moved troubleshooting guides to docs/09-troubleshooting/
- Moved quick start guides to docs/01-getting-started/
- Moved reports to reports/ directory
- Archived temporary files
- Generated comprehensive reports and documentation
- Created maintenance scripts and guides

All files organized according to established standards.
2026-01-06 01:46:25 -08:00

4.3 KiB

Omada Cloud Controller - Firewall Rules for Blockscout

Date: $(date)
Issue: HTTP 502 from Blockscout via Cloudflare Tunnel
Solution: Check and configure firewall rules via Omada Cloud Controller


🌐 Accessing Omada Cloud Controller

  1. Navigate to Omada Cloud Controller:

    https://omada.tplinkcloud.com
    
  2. Login with TP-Link ID:

    • Use your TP-Link account credentials
    • Your Omada Controller should appear in the list
    • Click Launch to access your controller
  3. Navigate to Firewall Rules:

    • Click Settings (gear icon)
    • Click Firewall in left sidebar
    • Click Firewall Rules tab

Option 2: Direct Controller Access (If Cloud Access is Enabled)

If your controller has cloud access enabled, you can also access it directly at:

https://192.168.11.8:8043

Use your Omada Controller admin credentials (not TP-Link ID).


🔍 Checking Firewall Rules for Blockscout

Blockscout Network Details

Component IP Address Port
Blockscout Container 192.168.11.140 80
cloudflared Container 192.168.11.7 -
Network Subnet 192.168.11.0/24 -

What to Look For

  1. Blocking Rules:

    • Any rule with Destination IP = 192.168.11.140 and Action = Deny
    • Any rule with Destination Port = 80 and Action = Deny
    • Default deny policies
  2. Allow Rules:

    • Rules allowing traffic from 192.168.11.0/24 to 192.168.11.140:80
    • Rules with Action = Allow and Protocol = TCP
  3. Rule Priority:

    • Allow rules must be ABOVE deny rules in priority
    • ⚠️ Rules are processed top to bottom (high priority → low priority)

Creating Firewall Allow Rule

If no allow rule exists, create one:

Rule Configuration

Name: Allow Internal to Blockscout HTTP
Enable: ✓ Yes
Action: Allow
Direction: Forward
Protocol: TCP
Source IP: 192.168.11.0/24 (or leave blank for "Any")
Source Port: (leave blank for "Any")
Destination IP: 192.168.11.140
Destination Port: 80
Priority: High (must be above any deny rules)

Steps

  1. In Omada Controller (via cloud or local):

    • Navigate to SettingsFirewallFirewall Rules
  2. Click Add or Create Rule button

  3. Configure the rule as shown above

  4. IMPORTANT: Set priority HIGH (drag rule to top of list, or set priority value higher than deny rules)

  5. Click Save or Apply

  6. Wait for configuration to apply to router (may take a few seconds)


📋 Verification Steps

After creating the firewall rule:

  1. Test connectivity from cloudflared container:

    # SSH to Proxmox host
    ssh root@<proxmox-host>
    
    # Test from cloudflared container (VMID 102)
    pct exec 102 -- curl -v http://192.168.11.140:80/health
    
  2. Expected result:

    • Should return HTTP 200 with JSON response
    • Should NOT return "No route to host" error
  3. Test Blockscout via Cloudflare Tunnel:

    curl https://explorer.d-bis.org/health
    
    • Should return HTTP 200 (not 502 Bad Gateway)

🔧 Troubleshooting

If "No route to host" persists:

  1. Check rule priority:

    • Ensure allow rule is above deny rules
    • Rules at the top have higher priority
  2. Check rule is enabled:

    • Verify the rule has "Enable" checkbox checked
  3. Check for overlapping deny rules:

    • Look for deny rules with broader matching (e.g., destination 192.168.11.0/24)
    • Ensure allow rule has higher priority
  4. Check router configuration:

    • Verify firewall is enabled on the router
    • Check if there are router-level firewall settings
  5. Test from different source:

    • Try testing from another host on the same subnet
    • This helps isolate if the issue is specific to cloudflared container

📝 Notes

  • Both cloudflared (VMID 102) and Blockscout (VMID 5000) are on the same subnet
  • Traffic on the same subnet should typically be allowed by default
  • If blocked, there's likely an explicit deny rule or restrictive default policy
  • The "No route to host" error indicates a firewall/routing issue (not DNS)

Last Updated: $(date)
Status: Manual configuration required via Omada Controller web interface