I was experiencing a few network issues since this morning when I connected a switch to which a Proxmox host was connected to the SRX. It took me a few hours to realize that the VyOS VM was still running on it so I had two routers in the same network, all with the same VLANS, subnets and DNS settings. I suspect that this was the issue with the DHCP server not updating the DNS server. Pretty stupid mistake.
I will try again again tomorrow with an address book and I will remove the propagate statement as well and let you know what happened.
Original Message:
Sent: 07-09-2025 08:22
From: Nikolay Semov
Subject: Simple question regarding policy naming/use
I missed that part of your configuration yesterday. Yes, addresses need to be defined in an address book attached to the corresponding zone. Note that you can attach an address book to more than one zone, and you have a global address book, so you can organize addresses however you like.
As for DHCP, the new name server you specified should be seen by clients when they renew their leases. Your configuration doesn't specify the lease time and I don't remember what the default is. Clients usually renew their leases automatically at half the lease time. Try restarting DHCP clients rather than the DHCP server.
Also, the propagate-settings option expects an interface that's using DHCP client, not the interface where the DHCP server is listening. The idea is that if SRX uses DHCP to obtain an address and various DHCP settings from an upstream DHCP server, you may want to propagate those settings to the SRX's DHCP clients. This doesn't seem to be the case in your situation, so you don't need that statement in there.
------------------------------
Nikolay Semov
Original Message:
Sent: 07-09-2025 01:06
From: ae716
Subject: Simple question regarding policy naming/use
I have tested the above configuration and it gives me the following error after loading the set:
[edit security policies from-zone WORK to-zone LAN] 'policy ALLOW_DNS_1' warning: Destination address or address_set (192.168.10.110/32) not found. Please check if it is a SecProfiling Feed.*from-zone WORK is an example, the same error comes up for any other zone where I have configured this policy
NOTE: This article suggests that creating an address book could prevent this warning, even though somewhere else I read that an address book is not strictly necessary Here's the link to the article (Juniper Support Portal)
Besides this, I have just tried to change the name server for the LAN DHCP (which should be reachable from LAN clients)
from this:set access address-assignment pool LAN_DHCP_POOL family inet network 192.168.10.0/24set access address-assignment pool LAN_DHCP_POOL family inet range junosRange low 192.168.10.2set access address-assignment pool LAN_DHCP_POOL family inet range junosRange high 192.168.10.99set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes router 192.168.10.1set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes name-server 1.1.1.1set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes propagate-settings irb.1to this:set access address-assignment pool LAN_DHCP_POOL family inet network 192.168.10.0/24set access address-assignment pool LAN_DHCP_POOL family inet range junosRange low 192.168.10.2set access address-assignment pool LAN_DHCP_POOL family inet range junosRange high 192.168.10.99set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes router 192.168.10.1set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes name-server 192.168.10.110set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes propagate-settings irb.1
But even after restarting the dhcp server, the changes do not propagate to the client.
I might need to say that I have configured 1.1.1.1 as the system dhcp
set system name-server 1.1.1.1
But this should not be name server that is given out to the clients, right?
Might also need to mention that I have the following in my set config:
set system services dhcp-local-server group jdhcp-group interface irb.1set system services dhcp-local-server group jdhcp-group interface irb.20set system services dhcp-local-server group jdhcp-group interface irb.30set system services dhcp-local-server group jdhcp-group interface irb.40
Could it be that those entries are causing the issue? Should I remove them since I have the following as well:
set access address-assignment pool LAN_DHCP_POOL family inet network 192.168.10.0/24set access address-assignment pool LAN_DHCP_POOL family inet range junosRange low 192.168.10.2set access address-assignment pool LAN_DHCP_POOL family inet range junosRange high 192.168.10.99set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes router 192.168.10.1set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes name-server 192.168.10.110set access address-assignment pool LAN_DHCP_POOL family inet dhcp-attributes propagate-settings irb.1set access address-assignment pool IoT_DHCP_POOL family inet network 192.168.20.0/24set access address-assignment pool IoT_DHCP_POOL family inet range junosRange low 192.168.20.2set access address-assignment pool IoT_DHCP_POOL family inet range junosRange high 192.168.20.99set access address-assignment pool IoT_DHCP_POOL family inet dhcp-attributes router 192.168.20.1set access address-assignment pool IoT_DHCP_POOL family inet dhcp-attributes name-server 192.168.10.110set access address-assignment pool IoT_DHCP_POOL family inet dhcp-attributes propagate-settings irb.20set access address-assignment pool GUEST_DHCP_POOL family inet network 192.168.30.0/24set access address-assignment pool GUEST_DHCP_POOL family inet range junosRange low 192.168.30.2set access address-assignment pool GUEST_DHCP_POOL family inet range junosRange high 192.168.30.99set access address-assignment pool GUEST_DHCP_POOL family inet dhcp-attributes router 192.168.30.1set access address-assignment pool GUEST_DHCP_POOL family inet dhcp-attributes name-server 192.168.10.110set access address-assignment pool GUEST_DHCP_POOL family inet dhcp-attributes propagate-settings irb.30set access address-assignment pool WORK_DHCP_POOL family inet network 192.168.40.0/29set access address-assignment pool WORK_DHCP_POOL family inet range junosRange low 192.168.40.2set access address-assignment pool WORK_DHCP_POOL family inet range junosRange high 192.168.40.6set access address-assignment pool WORK_DHCP_POOL family inet dhcp-attributes router 192.168.40.1set access address-assignment pool WORK_DHCP_POOL family inet dhcp-attributes name-server 192.168.10.110set access address-assignment pool WORK_DHCP_POOL family inet dhcp-attributes propagate-settings irb.40
------------------------------
Eric
Original Message:
Sent: 07-08-2025 23:35
From: Nikolay Semov
Subject: Simple question regarding policy naming/use
Yes, that looks alright.
------------------------------
Nikolay Semov
Original Message:
Sent: 07-08-2025 21:42
From: ae716
Subject: Simple question regarding policy naming/use
Great Nicolay! The above works very well! Thank you for your help.
If I was to add another rule for let's say maybe a local DNS server, could I just do something like this:
#Set a group to allow access to a local DNS serverset groups GROUP_ALLOW_DNS security policies from-zone <*> to-zone <*> policy ALLOW_DNS_1 match source-address anyset groups GROUP_ALLOW_DNS security policies from-zone <*> to-zone <*> policy ALLOW_DNS_1 match destination-address 192.168.10.110/32set groups GROUP_ALLOW_DNS security policies from-zone <*> to-zone <*> policy ALLOW_DNS_1 match application junos-dnsset groups GROUP_ALLOW_DNS security policies from-zone <*> to-zone <*> policy ALLOW_DNS_1 then permit#Apply group to policyset security policies from-zone IoT to-zone LAN apply-groups GROUP_ALLOW_DNSset security policies from-zone GUEST to-zone LAN apply-groups GROUP_ALLOW_DNS...*The goal is to allow hosts in zones "IoT"and "GUEST" who usually don't have access to zone LAN to reach a DNS server that is located in zone "LAN" only on port 53
------------------------------
Eric
Original Message:
Sent: 07-08-2025 20:39
From: ae716
Subject: Simple question regarding policy naming/use
So that means I could put all of the above source nat rules into a simple block like so: ?
set security nat source rule-set SOURCE-NAT-TO-WAN from zone [LAN IoT GUEST WORK] set security nat source rule-set SOURCE-NAT-TO-WAN to zone WANset security nat source rule-set SOURCE-NAT-TO-WAN rule ALLOW_ALL_SOURCE_ADDRESSES match source-address 0.0.0.0/0set security nat source rule-set SOURCE-NAT-TO-WAN rule ALLOW_ALL_SOURCE_ADDRESSES then source-nat interface
------------------------------
Eric
Original Message:
Sent: 07-08-2025 20:33
From: Nikolay Semov
Subject: Simple question regarding policy naming/use
Yes, apply-groups GROUP_ALLOW_ALL, but yes, either way is fine. You can even mix the two if you like, though keep in mind that if you have a matching zone-based policy, it will take precedence over global policy.
As for NAT, I'm not sure why the difference; I guess if you look at it on its own, it's alright.
Each NAT rule-set can match multiple zones with [ ], so you don't have to split them up so much, but yes, each rule needs a unique name even if it's in a separate rule-set. I guess internally the NAT rule names are used as a key, so it needs to be unique, while security policies all get index numbers upon commit so the names can repeat.
------------------------------
Nikolay Semov
Original Message:
Sent: 07-08-2025 20:18
From: ae716
Subject: Simple question regarding policy naming/use
Nicolay, thanks for your explanation. I understand that I have to deal with a new syntax so I am willing to learn the best practices for writing rules on Junos.
Just to make sure I'm not missing anything, I could write the current rules as either
##NOT USING GLOBAL POLICIESset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL match source-address anyset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL match destination-address anyset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL match application anyset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL then permitset security policies from-zone LAN to-zone LAN apply-groups ALLOW_ALLset security policies from-zone LAN to-zone IoT apply-groups ALLOW_ALLset security policies from-zone LAN to-zone GUEST apply-groups ALLOW_ALLset security policies from-zone LAN to-zone WORK apply-groups ALLOW_ALLset security policies from-zone LAN to-zone WAN apply-groups ALLOW_ALLset security policies from-zone IoT to-zone WAN apply-groups ALLOW_ALLset security policies from-zone GUEST to-zone WAN apply-groups ALLOW_ALLset security policies from-zone WORK to-zone WAN apply-groups ALLOW_ALL
or as
##USING GLOBAL POLICIES##set groups GROUP_ALLOW_ALL security policies global policy <*> match source-address anyset groups GROUP_ALLOW_ALL security policies global policy <*> match destination-address anyset groups GROUP_ALLOW_ALL security policies global policy <*> match application anyset groups GROUP_ALLOW_ALL security policies global policy <*> then permit# # #set security policies global policy FROM_LAN match from-zone LAN set security policies global policy FROM_LAN match to-zone [LAN IoT GUEST WORK WAN]set security policies global policy FROM_LAN apply-groups GROUP_ALLOW_ALL# # #set security policies global policy TO_WAN match from-zone [IoT GUEST WORK] set security policies global policy TO_WAN match to-zone WAN set security policies global policy TO_WAN apply-groups GROUP_ALLOW_ALL
Would that be correct? I am also getting confused with the terminology of groups, sets, etc. For example when it comes to policies, I might be able to use the above example. But when I look at the (source) NAT section of my set config, it uses the term "rule-set" instead of using the same syntax as in set security policies. Is there a specific reason for this? Also with this source nat rules, would there be a shorter way of writing them? I figured out that I had to assign a different rule name for each zone otherwise I could not commit the configuration.
set security nat source rule-set LAN-to-WAN from zone LANset security nat source rule-set LAN-to-WAN to zone WANset security nat source rule-set LAN-to-WAN rule source-nat-rule_LAN match source-address 0.0.0.0/0set security nat source rule-set LAN-to-WAN rule source-nat-rule_LAN then source-nat interfaceset security nat source rule-set IoT-to-WAN from zone IoTset security nat source rule-set IoT-to-WAN to zone WANset security nat source rule-set IoT-to-WAN rule source-nat-rule_IoT match source-address 0.0.0.0/0set security nat source rule-set IoT-to-WAN rule source-nat-rule_IoT then source-nat interfaceset security nat source rule-set GUEST-to-WAN from zone GUESTset security nat source rule-set GUEST-to-WAN to zone WANset security nat source rule-set GUEST-to-WAN rule source-nat-rule_GUEST match source-address 0.0.0.0/0set security nat source rule-set GUEST-to-WAN rule source-nat-rule_GUEST then source-nat interfaceset security nat source rule-set WORK-to-WAN from zone WORKset security nat source rule-set WORK-to-WAN to zone WANset security nat source rule-set WORK-to-WAN rule source-nat-rule_WORK match source-address 0.0.0.0/0set security nat source rule-set WORK-to-WAN rule source-nat-rule_WORK then source-nat interface
I am really sorry for bothering you with all these questions but while I am not new to networking, I am having a hard time understanding some aspects of Junos. Anyways, thank you for your patience.
------------------------------
Eric
Original Message:
Sent: 07-08-2025 19:43
From: Nikolay Semov
Subject: Simple question regarding policy naming/use
No. I understand you prefer the VyOS syntax, but while SRX configuration looks similar, the JunOS configuration syntax is not the same as in VyOS.
You can only match multiple zones at once when using global policies (see the documentation link in my first response), like this:
set groups GROUP_ALLOW_ALL security policies global policy <*> match source-address anyset groups GROUP_ALLOW_ALL security policies global policy <*> match destination-address anyset groups GROUP_ALLOW_ALL security policies global policy <*> match application anyset groups GROUP_ALLOW_ALL security policies global policy <*> then permit# # #set security policies global policy FROM_LAN match from-zone LAN set security policies global policy FROM_LAN match to-zone [LAN IoT GUEST WORK WAN]set security policies global policy FROM_LAN apply-groups GROUP_ALLOW_ALL# # #set security policies global policy TO_WAN match from-zone [IoT GUEST WORK] set security policies global policy TO_WAN match to-zone WAN set security policies global policy TO_WAN apply-groups GROUP_ALLOW_ALL
------------------------------
Nikolay Semov
Original Message:
Sent: 07-08-2025 19:35
From: ae716
Subject: Simple question regarding policy naming/use
Hi Nicolay, sorry for another question. I am still trying to understand your suggestion about creating groups (although I would prefer the way I have done this on VyOS as you can see from my other reply).
So, we still have the same policies:
set security policies from-zone LAN to-zone LAN policy LAN-to-LAN match source-address anyset security policies from-zone LAN to-zone LAN policy LAN-to-LAN match destination-address anyset security policies from-zone LAN to-zone LAN policy LAN-to-LAN match application anyset security policies from-zone LAN to-zone LAN policy LAN-to-LAN then permitset security policies from-zone LAN to-zone IoT policy LAN-to-IoT match source-address anyset security policies from-zone LAN to-zone IoT policy LAN-to-IoT match destination-address anyset security policies from-zone LAN to-zone IoT policy LAN-to-IoT match application anyset security policies from-zone LAN to-zone IoT policy LAN-to-IoT then permitset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST match source-address anyset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST match destination-address anyset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST match application anyset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST then permitset security policies from-zone LAN to-zone WORK policy LAN-to-WORK match source-address anyset security policies from-zone LAN to-zone WORK policy LAN-to-WORK match destination-address anyset security policies from-zone LAN to-zone WORK policy LAN-to-WORK match application anyset security policies from-zone LAN to-zone WORK policy LAN-to-WORK then permitset security policies from-zone LAN to-zone WAN policy LAN-to-WAN match source-address anyset security policies from-zone LAN to-zone WAN policy LAN-to-WAN match destination-address anyset security policies from-zone LAN to-zone WAN policy LAN-to-WAN match application anyset security policies from-zone LAN to-zone WAN policy LAN-to-WAN then permitset security policies from-zone IoT to-zone WAN policy IoT-to-WAN match source-address anyset security policies from-zone IoT to-zone WAN policy IoT-to-WAN match destination-address anyset security policies from-zone IoT to-zone WAN policy IoT-to-WAN match application anyset security policies from-zone IoT to-zone WAN policy IoT-to-WAN then permitset security policies from-zone GUEST to-zone WAN policy GUEST-to-WAN match source-address anyset security policies from-zone GUEST to-zone WAN policy GUEST-to-WAN match destination-address anyset security policies from-zone GUEST to-zone WAN policy GUEST-to-WAN match application anyset security policies from-zone GUEST to-zone WAN policy GUEST-to-WAN then permitset security policies from-zone WORK to-zone WAN policy WORK-to-WAN match source-address anyset security policies from-zone WORK to-zone WAN policy WORK-to-WAN match destination-address anyset security policies from-zone WORK to-zone WAN policy WORK-to-WAN match application anyset security policies from-zone WORK to-zone WAN policy WORK-to-WAN then permit
Would I be right in my assumption, that we can write this as the following (using groups)?
set groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL match source-address anyset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL match destination-address anyset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL match application anyset groups GROUP_ALLOW_ALL security policies from-zone <*> to-zone <*> policy ALLOW_ALL then permitset security policies from-zone LAN to-zone [LAN IoT GUEST WORK WAN] apply-groups GROUP_ALLOW_ALLset security policies from-zone [IoT GUEST WORK] to-zone WAN apply-groups GROUP_ALLOW_ALL
------------------------------
Eric Akimoto
Original Message:
Sent: 07-08-2025 10:51
From: Nikolay Semov
Subject: Simple question regarding policy naming/use
1)
Yes!!! This is one my favorite JunOS features -- Configuration Groups (see https://www.juniper.net/documentation/us/en/software/junos/cli/topics/topic-map/configuration-groups-usage.html for lots of examples)!
You can use groups not just for policies, but also for any part of the configuration where you may have lots of repetition.
For security policies specifically, though, you also have the option to use global policies (https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-global-policies.html) and those support matching multiple zones at once. In JunOS a set of values is enclosed in [ ] rather than { }. Use the "?" when typing in commands to see available options -- when a set of values is supported, you will see "[" listed as an option.
So, for policies you can do:
set groups policy_group1 security policies from-zone <*> to-zone <*> policy allow-all /*blah blah blah*/set security policies from-zone LAN to-zone WAN apply-groups policy_group1set security policies from-zone IoT to-zone WAN apply-groups policy_group1
Or
set security policies global policy allow-all match from-zone [LAN IoT]set security policies global policy allow-all match to-zone WANset security policies global policy allow-all /*blah blah blah*/
Though, do read the documentation on global policies for caveats when it comes to mixing zone-based and global policies.
2)
Define addresses and address sets under security address-book and then use those named addresses (or address sets) in policies. You can specify more than one address in a policy with [ ]. The question mark is your friend, use it!
3)
Within a section where order matters (such as policies), they are processed in the order in which they appear. You can use the insert command to change the order. For example:
{primary:node0}[edit security policies from-zone LAN to-zone WAN]user@MY-DEVICE# insert policy some_policy before policy some_other_policy /*OR*/user@MY-DEVICE# insert policy some_policy after policy some_other_policy
4)
Yes, NAT rule sets support matching multiple zones at once with the set definition [ ].
------------------------------
Nikolay Semov
Original Message:
Sent: 07-08-2025 03:45
From: ae716
Subject: Simple question regarding policy naming/use
Would it be possible to create security policies and later attach them to zones when needed? I have done this on VyOS and it makes reading through the SET commands much easier. Here is an example:
I would like to change the following:
set security policies from-zone LAN to-zone LAN policy LAN-to-LAN match source-address anyset security policies from-zone LAN to-zone LAN policy LAN-to-LAN match destination-address anyset security policies from-zone LAN to-zone LAN policy LAN-to-LAN match application anyset security policies from-zone LAN to-zone LAN policy LAN-to-LAN then permitset security policies from-zone LAN to-zone IoT policy LAN-to-IoT match source-address anyset security policies from-zone LAN to-zone IoT policy LAN-to-IoT match destination-address anyset security policies from-zone LAN to-zone IoT policy LAN-to-IoT match application anyset security policies from-zone LAN to-zone IoT policy LAN-to-IoT then permitset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST match source-address anyset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST match destination-address anyset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST match application anyset security policies from-zone LAN to-zone GUEST policy LAN-to-GUEST then permitset security policies from-zone LAN to-zone WORK policy LAN-to-WORK match source-address anyset security policies from-zone LAN to-zone WORK policy LAN-to-WORK match destination-address anyset security policies from-zone LAN to-zone WORK policy LAN-to-WORK match application anyset security policies from-zone LAN to-zone WORK policy LAN-to-WORK then permitset security policies from-zone LAN to-zone WAN policy LAN-to-WAN match source-address anyset security policies from-zone LAN to-zone WAN policy LAN-to-WAN match destination-address anyset security policies from-zone LAN to-zone WAN policy LAN-to-WAN match application anyset security policies from-zone LAN to-zone WAN policy LAN-to-WAN then permit
to this
set security policies policy ALLOW_ALL match source-address anyset security policies policy ALLOW_ALL match destination-address anyset security policies policy ALLOW_ALL match application anyset security policies policy ALLOW_ALL then permitset security policies from-zone LAN to-zone LAN policy ALLOW_ALLset security policies from-zone LAN to-zone IoT policy ALLOW_ALLset security policies from-zone LAN to-zone GUEST policy ALLOW_ALLset security policies from-zone LAN to-zone WORK policy ALLOW_ALL
Or would it even be possible to make it even shorter by doing something like this:
set security policies policy ALLOW_ALL match source-address anyset security policies policy ALLOW_ALL match destination-address anyset security policies policy ALLOW_ALL match application anyset security policies policy ALLOW_ALL then permitset security policies from-zone LAN to-zone {LAN IoT GUEST WORK} policy ALLOW_ALL
Finally, I would like to create rules which are later attached to a zone when needed. For example:
set security policies policy ALLOW_DNS match source-address 192.168.10.1/24 - 192.168.40.1/24set security policies policy ALLOW_ALL match destination-address 192.168.10.110/32set security policies policy ALLOW_ALL match application dnsset security policies policy ALLOW_ALL then permit
and then attach them to zones when they become required:
set security policies from-zone {LAN IoT GUEST WORK} to-zone LAN policy ALLOW_DNS
Again here are my questions:
1) Would this concept work on Junos (SRX)?
2) Please check if the syntax used is correct, e.g. multiple addresses (192.168.10.1/24, 192.168.20.1/24, 192.168.30.1/24 ...) and application name.
3) How to set the order of the rules if multiple policies are applied?
4) Can do the same for nat rules? For example I would like to change:
set security nat source rule-set LAN-to-WAN from zone LANset security nat source rule-set LAN-to-WAN to zone WANset security nat source rule-set LAN-to-WAN rule source-nat-rule_LAN match source-address 0.0.0.0/0set security nat source rule-set LAN-to-WAN rule source-nat-rule_LAN then source-nat interfaceset security nat source rule-set IoT-to-WAN from zone IoTset security nat source rule-set IoT-to-WAN to zone WANset security nat source rule-set IoT-to-WAN rule source-nat-rule_IoT match source-address 0.0.0.0/0set security nat source rule-set IoT-to-WAN rule source-nat-rule_IoT then source-nat interfaceset security nat source rule-set GUEST-to-WAN from zone GUESTset security nat source rule-set GUEST-to-WAN to zone WANset security nat source rule-set GUEST-to-WAN rule source-nat-rule_GUEST match source-address 0.0.0.0/0set security nat source rule-set GUEST-to-WAN rule source-nat-rule_GUEST then source-nat interfaceset security nat source rule-set WORK-to-WAN from zone WORKset security nat source rule-set WORK-to-WAN to zone WANset security nat source rule-set WORK-to-WAN rule source-nat-rule_WORK match source-address 0.0.0.0/0set security nat source rule-set WORK-to-WAN rule source-nat-rule_WORK then source-nat interface
to something like this:
set security nat source rule-set SOURCE_NAT_ALLOW_ALL match source-address 0.0.0.0/0set security nat source rule-set SOURCE_NAT_ALLOW_ALL then source-nat interfaceset security nat source rule-set SOURCE_NAT_ALLOW_ALL from zone LAN IoT GUEST WORK to zone WAN
Thank you for your help.