Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Difficulty access the internet using my VLAN as an Guest Access Point

    Scheduled Pinned Locked Moved General pfSense Questions
    36 Posts 7 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      papdee @JKnott
      last edited by

      @jknott Oh...and I forgot...

      If an attacker fails to break into your super hardened switch all they need to do is literally cut the physical cable that is the trunk cable, crimp it with a new RJ45 plug, and plug it into their own switch and feed it back. Unless you have the proper monitoring software on your trunk line you wouldn't know.

      1 Reply Last reply Reply Quote 0
      • P
        papdee
        last edited by

        if all you're doing is setting up a VLAN for friends and family I don't see where your concerns are. VLAN's are fine your purpose.

        VLAN's are adequate for creating private networks
        VLAN's should not be relied upon for security if that's what you're looking for.

        1 Reply Last reply Reply Quote 1
        • NollipfSenseN
          NollipfSense @cxcmax
          last edited by

          @cxcmax To me, your setup seems awkward...why not put an guest AP device that does its own DHCP and let your pfSense do DNS? Seems simpler than to have a static IP for your AP then trying to use the vlan as DHCP server.

          pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
          pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

          P 1 Reply Last reply Reply Quote 0
          • P
            papdee @stephenw10
            last edited by

            @stephenw10 alternatively why don't you point me to a reliable source that states VLANs are a viable security solution.

            stephenw10S 1 Reply Last reply Reply Quote 0
            • P
              papdee @NollipfSense
              last edited by

              @nollipfsense all APs should use static IP. This will allow you to configure the firewall to block access to the management interface. It will also allow you to manage APs with management software.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator @JKnott
                last edited by

                @jknott said in Difficulty access the internet using my VLAN as an Guest Access Point:

                For an unmanaged switch to not pass a VLAN frame, it would have to check the Ethertype and then specifically drop VLAN frames. It seems to me that's a lot to ask of a dumb switch. And to what end?

                Indeed it would have to do exactly that. When I have seen this it's because what appears to be a 'dumb' switch is in fact a managed switch IC that is simply configured as a single VLAN. As I understand it (and I won't pretend to have done an exhaustive study here!) most small unmanaged switches are built like that because those are the available switch ICs. But when configured as port based VLAN they will pass all tagged traffic.
                I have most commonly hit this as a problem when people try to re-use some combo device as a switch. So a router/AP/switch style device. Typically those are configured in 802.1q mode to segregate ports but there's no way to know until you test it since that is not exposed to the user interface.
                Anyway having wasted hours or my life trying to solve a problem only to discover there was an additional 'dumb' switch in the connection I hadn't been told about I can only advise; do not assume tagged traffic will pass. ๐Ÿ˜‰

                Steve

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator @papdee
                  last edited by

                  @papdee said in Difficulty access the internet using my VLAN as an Guest Access Point:

                  @stephenw10 alternatively why don't you point me to a reliable source that states VLANs are a viable security solution.

                  I think you will need to define 'security solution' in that context.

                  Typically VLANs are used to segregate traffic that is using the same physical connection. If that's for security reasons then it could be considered a security solution IMO.
                  You have suggested it's possible, trivial even, to 'hop' VLANs which I understand to mean a host on one VLAN is able to access a resource on a different VLAN. Maybe I've misunderstood what you're saying. I'm not aware of any way to do that without re-configuring a switch in between but I'd love to learn if it is.

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @papdee
                    last edited by

                    @papdee

                    ????

                    What do your posts have to do with mine?
                    I'm well aware of how VLANs work. I use one here for my guest WiFi, have set some up for business customers and am a Cisco CCNA.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    P 1 Reply Last reply Reply Quote 0
                    • P
                      papdee @JKnott
                      last edited by

                      @jknott sorry fat fingers. should have been the one above you

                      1 Reply Last reply Reply Quote 0
                      • B
                        bPsdTZpW @papdee
                        last edited by

                        @papdee said in Difficulty access the internet using my VLAN as an Guest Access Point:

                        @jknott

                        1. At the cable level VLAN hopping is straightforward. There is nothing to mitigate this.

                        As with any computer system, if the attacker has physical access to the relevant trusted hardware, it's game over for security. There is nothing VLAN-specific about this issue.

                        1. At the switch level there are various ways to hop a VLAN. Most switches fresh out of their packing box will allow you to hop the VLAN. You must to take the effort to harden the switch. Even though you have spent days maybe weeks hardening your switch any security bugs in the software makes your hardening completely useless. For e.g. Some Cisco switches have a security bug in the HTTP server that is suscetiple to an OB attack giving the attacker executive privileges. This attack is easy to execute using simple telnet and a python script.

                        As with any computer system, misconfiguration or security bugs will hose you. There is nothing VLAN-specific about this issue.

                        1. Finally there is the human error aspect. You can spend forever hardening your switch but at some point you are going to need to take that little paperclip bend it straight and do a full blown reset on the switch. At which point you forget you have just unhardened your switch.

                        As with any computer system, human error will hose you. There is nothing VLAN-specific about this issue.

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          These are worthy topics for discussion but we are derailing @cxcmax's thread ๐Ÿ˜‰

                          I suggest moving to a new thread in off-topic to discuss VLANs in general. Thanks.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.