@Chrisnz said in Split DHCP ranges on Bridge?:
pfSense automatically routes between the subnets if the interfaces are part of the pfSense machine
That is not just pfsense, that is any router or any device at all to be honest... Why would you have tell a device how to talk to a network that its attached to.. The act of attaching it tells it how to talk to that network.. Just blows my mind how often this comes up..
If you have devices you want to filter, yes as jknott mentions it would be better to put them on their own vlan... This way you don't have to worry about assigning specific IPs just so you can filter them. From a security point of view, while I hand out IP address xyz to you, doesn't mean you could use IP address abc instead and now that firewall rule wouldn't block you. Or might not block you, etc. Depending exactly.. So its better to segment devices that will have the same restrictions or allowances to the same vlan. So you really don't have to worry about specifics like that.
But sure if you don't want IP 1.2.3.4 from going somewhere, just block it via a firewall rule.
What AP do you have, what switching - do you have the ability to do vlans on your network... That would be the more secure method of limiting something. Example I put all my iot devices on their own vlan.. This vlan can not talk to any other of my local networks. Except for stuff that I want to allow.. Its always best to block and make exceptions for allow, vs allow all and block specifics.
So from this other vlan would normally block everyone from talking to lan, and only allow specific IPs to talk to specific IPs on the lan, and only the services it needs on those specific IPs in the lan.