• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Guest network block computer to computer

Scheduled Pinned Locked Moved Firewalling
12 Posts 5 Posters 1.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    hagensieker
    last edited by Jul 30, 2016, 9:06 PM

    I have two wifi access points.  One is on VLAN10 and is internet only and cannot see the other network.

    Is it possible to create rules that prevent any computer on this VLAN10 guest network from seeing another computer on the same VLAN10 network?

    1 Reply Last reply Reply Quote 0
    • D
      Derelict LAYER 8 Netgate
      last edited by Jul 30, 2016, 9:27 PM

      No. That is same-segment traffic and must be blocked in your switch.

      The firewall is not involved in traffic between hosts on the same segment.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • H
        hagensieker
        last edited by Jul 30, 2016, 9:33 PM

        @Derelict:

        No. That is same-segment traffic and must be blocked in your switch.

        The firewall is not involved in traffic between hosts on the same segment.

        Thanks.  I'll take a look at my switch config but I'm wondering if I can do that I have a TP-Link Easy Smart Switch 16 port.

        1 Reply Last reply Reply Quote 0
        • H
          hagensieker
          last edited by Jul 30, 2016, 9:37 PM

          I need a layer 3 Managed Switch to do that, don't I?

          1 Reply Last reply Reply Quote 0
          • D
            Derelict LAYER 8 Netgate
            last edited by Jul 30, 2016, 10:31 PM

            Layer 3 won't get you anything. You need to block that at layer 2.

            Or put your guests on one segment and your private on another. In which case pfSense can firewall between them.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • A
              Alesk13Fr
              last edited by Aug 6, 2016, 1:03 PM

              Hi,

              If all your device from this WiFi VLAN are WiFi client, check on you access point configuration, on some device you can find "isolate guest" or 'isolate client" option, with this, each client will be isolated from other WiFi client.

              Hope this help.

              Best regards,
              Alex.

              1 Reply Last reply Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator
                last edited by Aug 6, 2016, 1:14 PM

                ^ exactly if what your trying to do is isolated wifi clients from each other on the same wifi network.  In a wired network it would be a private vlan..

                Are you trying to prevent wifi clients from seeing wired clients on your vlan10 or other wifi clients and there are no wired devices on vlan10.. If this is a guest wifi network there shouldn't be anything on that vlan for guest to access other than pfsense as their gateway and other wifi clients maybe which you can stop with isolation via your AP..  What is the exact device your using for your AP?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • J
                  JKnott
                  last edited by Aug 8, 2016, 2:59 PM

                  Is it possible to create rules that prevent any computer on this VLAN10 guest network from seeing another computer on the same VLAN10 network?

                  One common method is to use a VLAN and 2nd SSID.  The router is configured so that guest traffic is allowed access to the Internet only.  Many consumer grade routers support this, as does pfSense.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  1 Reply Last reply Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator
                    last edited by Aug 8, 2016, 3:29 PM

                    One problem is that most consumer grade wifi routers use of guest ssid depend on the wifi router being the edge router doing the nat to the public internet.  The proper way to do this with pfsense is yes with your different ssids being on different vlans.  But it is rare for consumer wifi routers to support this, you might have some luck with 3rd party firmware like dd-wrt, openwrt, etc.

                    But your best bet is to just get a real AP with vlan support and use of a smart switch that also does vlans.. Now your cooking with gas in isolation of different network traffic on your network.

                    But sure if you take any home wifi router and use it as just an AP and connect this to a different network on pfsense be it native untagged or a vlan you can isolate that traffic from the rest of your network.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • J
                      JKnott
                      last edited by Aug 8, 2016, 4:33 PM

                      But your best bet is to just get a real AP with vlan support

                      I have a TP-Link WA-901ND access point that supports VLANs and up to 4 SSIDs.  However, I discovered a problem with it.  ICMPv6 was leaking from the main LAN to the VLAN, with the result that devices connected to the guest SSID/VLAN were getting IPv6 addresses intended for the main LAN.  I have no idea why it would do that and the first support "tech" thought that was normal.  Another, more senior one agreed it was a problem, but no fix was forthcoming.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • J
                        johnpoz LAYER 8 Global Moderator
                        last edited by Aug 8, 2016, 5:33 PM

                        Problem with those consumer sort of devices, even a "AP" is the fixes and updates to their firmware is rare if ever.  Something like unifi I have seen fixes to firmware in a couple of days if a bug/issue is reported.  They are very active updates both on their controller software and firmware.

                        Those consumer type companies are more worried about selling the next model than keeping their previous model firmware updated with fixes and or features.

                        As to this issue you found with icmpv6 so it was the only thing leaking from the native untagged network to the vlans, there was no other flooding or bleed?  So it was "leaking" to all the vlans?  Or just a specific one?

                        Do you have the v4 model of that AP.. Last update I see for NA was oct 2015 for igmp proxy issue.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • J
                          JKnott
                          last edited by Aug 8, 2016, 6:01 PM

                          I have a V2 model, with the firmware version 3.12.16 Build 130131 Rel.53760n, which is a beta version from Nov. 2013.  I only noticed ICMPv6 leaking and only in the one direction.  I just had VLAN 5 in use, so I can't speak about other VLANs.  My main network was on the main LAN with guests on VLAN 5.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          1 out of 12
                          • First post
                            1/12
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received