• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Providing isolation between Vlans!

Scheduled Pinned Locked Moved L2/Switching/VLANs
32 Posts 9 Posters 4.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • E
    enesas @johnpoz
    last edited by Jul 2, 2022, 3:53 PM

    @johnpoz thenk you

    1 Reply Last reply Reply Quote 0
    • J
      JKnott @enesas
      last edited by Jul 2, 2022, 9:07 PM

      @enesas

      Here is what I have on my guest WiFi VLAN. It allows no contact at all with my LAN or router, other than pinging the interface it's connected to.

      0b37a155-7e92-4f33-903a-53e0a51678b5-image.png

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      J J 2 Replies Last reply Jul 2, 2022, 9:13 PM Reply Quote 0
      • J
        johnpoz LAYER 8 Global Moderator @JKnott
        last edited by Jul 2, 2022, 9:13 PM

        @jknott I don't know what you think those rules are going to allow, your first rule there is block rfc1918 source.. Which is before icmp, so only thing that would work is IPv6 ping.

        So unless you have some floating those rules make no sense. How is bogon going to be source to your wifi vlan interface?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        J 1 Reply Last reply Jul 2, 2022, 9:23 PM Reply Quote 0
        • J
          JKnott @johnpoz
          last edited by Jul 2, 2022, 9:23 PM

          @johnpoz

          Ooops! I copied the wrong rules. Here's what I meant to post. The other one is my WAN rules.

          These are my guest WiFi rules.

          9ac12615-e439-4c6f-b7b3-41d678ff7fbc-image.png

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          J B 2 Replies Last reply Jul 2, 2022, 9:27 PM Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator @JKnott
            last edited by Jul 2, 2022, 9:27 PM

            @jknott haha - ok that makes more sense ;)

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • J
              Jarhead @JKnott
              last edited by Jul 2, 2022, 9:29 PM

              @jknott What's the point of the "Block All"?
              That's already there without adding that rule.

              J J 2 Replies Last reply Jul 2, 2022, 9:31 PM Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator @Jarhead
                last edited by johnpoz Jul 2, 2022, 9:32 PM Jul 2, 2022, 9:31 PM

                @jarhead that rule is set to not log.. So if he was logging default deny (which is default to do).. He would not log any traffic hitting that block before the default deny which would log.

                Common practice to put in rule like that so you don't log a lot of noise, I have my default log off, and just have a block rule at the end of my wan that logs only "SYN" hits.. And common UDP ports for example.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                J 1 Reply Last reply Jul 2, 2022, 9:34 PM Reply Quote 0
                • J
                  Jarhead @johnpoz
                  last edited by Jul 2, 2022, 9:34 PM

                  @johnpoz Ok, gotcha. Makes sense but I would rather log blocks. Guess I won't be adding a Block All rule. 😀

                  J 1 Reply Last reply Jul 2, 2022, 9:37 PM Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator @Jarhead
                    last edited by johnpoz Jul 2, 2022, 9:39 PM Jul 2, 2022, 9:37 PM

                    @jarhead you can log what you want, here are my 2 rules on wan that log stuff I block, and also log some of the stuff I allow.

                    Notice the little log icons, and the gear which says I did something special with the rule - in my case I only log syn only packets, if its something other like a SA or other out of state traffic that might hit my wan I don't really care to see it.

                    And UDP - while I don't want to see all the random off the wall upd noise - I do like to see interesting UDP ports and where I am being hit from, etc.

                    examplewan.jpg

                    Anything I do not allow still hits the default deny, just not logged because I turned off the option to log default deny rule.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    J 1 Reply Last reply Jul 2, 2022, 9:47 PM Reply Quote 0
                    • J
                      Jarhead @johnpoz
                      last edited by Jul 2, 2022, 9:47 PM

                      @johnpoz Yeah, I got that, was just making a joke because I see no reason to add a Block All rule even if just for logging since you can just turn logging off. Yours I can see because you're logging specific things, but Block All makes no sense to me.

                      J 1 Reply Last reply Jul 2, 2022, 9:49 PM Reply Quote 0
                      • J
                        johnpoz LAYER 8 Global Moderator @Jarhead
                        last edited by johnpoz Jul 2, 2022, 9:51 PM Jul 2, 2022, 9:49 PM

                        @jarhead only problem is - maybe he wants to see default logs on is lan side interfaces, but not on his wan.

                        You can't just turn off not log default for specific interfaces - its all or nothing ;) So if he wants to see those logs, but not all the noise on is wan, creating your own catch all block that would be hit before the default that does not log, would accomplish that.

                        I wouldn't do it the way he is doing it either ;) But hey there are multiple ways to skin a cat..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • J
                          JKnott @Jarhead
                          last edited by Jul 2, 2022, 11:33 PM

                          @jarhead

                          I use block on the WAN side, instead of reject, as it makes it appear as nothing is there. A reject will tell incoming traffic it's not allowed, revealing the presence of some device. I'm not sure if the default rule is reject or block.

                          On internal rules, I use reject, not block.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          J 1 Reply Last reply Jul 3, 2022, 1:00 AM Reply Quote 0
                          • J
                            Jarhead @JKnott
                            last edited by Jul 3, 2022, 1:00 AM

                            @jknott It's block.

                            block.png

                            1 Reply Last reply Reply Quote 0
                            • B
                              Bob.Dig LAYER 8 @JKnott
                              last edited by Bob.Dig Jul 3, 2022, 6:31 AM Jul 3, 2022, 6:30 AM

                              @jknott said in Providing isolation between Vlans!:

                              9ac12615-e439-4c6f-b7b3-41d678ff7fbc-image.png

                              This is an interesting one: Reject "Prefix".
                              If your prefix is dynamic, like for most of us who at home get IPv6 from their ISP, it would be nice to have this feature, but not much interest so far it seems. 😞

                              But I know, jknott will keep his prefix stable by all means and john doesn't care for IPv6 to much. 😉

                              J T J 3 Replies Last reply Jul 3, 2022, 10:18 AM Reply Quote 0
                              • J
                                johnpoz LAYER 8 Global Moderator @Bob.Dig
                                last edited by johnpoz Jul 3, 2022, 10:29 AM Jul 3, 2022, 10:18 AM

                                @bob-dig said in Providing isolation between Vlans!:

                                and john doesn't care for IPv6 to much

                                Haha - not that I don't care for it, I just don't see it as actually needed as of yet. I agree its the future for sure, and its got some slick stuff going for it.. But its not something you actually need. My isp doesn't even have it ;) I play with it via HE tunnel.. Which to be honest has some huge advantages over many an isp IPv6 so called deployments..

                                Its something that everyone should play with, but if you don't have time or desire to learn its differences - sure simple solution is not worry about it.

                                When someone here actually names one resource that requires I have IPv6 that I would care to visit ;) Then sure I will turn it on for all my networks, other then my play vlans, and my pc which I just toggle it on or off if I am playing with something IPv6 related.

                                For the time being and many years into the future, its just not something a user actually needs to worry about. If they are having issues with it, it simpler to just not use it.. Nothing say you have to.

                                Here something I keep meaning to look into for example, site I use pretty often tvmaze, just doesn't work with IPv6.. It has an IPv6 address (i can ping it on IPv6), I just can get to it when I enable IPv6 on my pc. It never fails back to IPv4. Its on my list of things to investigate why ;)

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                B J 2 Replies Last reply Jul 3, 2022, 11:03 AM Reply Quote 0
                                • B
                                  Bob.Dig LAYER 8 @johnpoz
                                  last edited by Bob.Dig Jul 3, 2022, 11:12 AM Jul 3, 2022, 11:03 AM

                                  @johnpoz But around the world it is different, you often only get a public and dynamic IPv6 (prefix) reachable from the outside. I will "fight" this for myself as long as I can for sure but for others, it is their reality.

                                  PS: I pay one and a half bug per month for a VPS with its own dedicated IPv4-address and I am almost feeling guilty. 😓

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    the other @Bob.Dig
                                    last edited by Jul 3, 2022, 11:36 AM

                                    @bob-dig said in Providing isolation between Vlans!:

                                    it would be nice to have this feature, but not much interest so far it seems.

                                    Hello there,
                                    I have to contradict: I am VERY interested in that feature. In fact, I wouldn't know, why anyone with dynamic prefix lease from ISP can be NOT interested...
                                    😁

                                    the other

                                    pure amateur home user, no business or professional background
                                    please excuse poor english skills and typpoz :)

                                    J 1 Reply Last reply Jul 3, 2022, 12:54 PM Reply Quote 1
                                    • J
                                      JKnott @Bob.Dig
                                      last edited by Jul 3, 2022, 12:48 PM

                                      @bob-dig said in Providing isolation between Vlans!:

                                      This is an interesting one: Reject "Prefix".

                                      I manually entered that value. My ISP uses DHCPv6-PD to assign prefixes, but mine doesn't change. In fact, it has survived replacing, at different times, my modem and the computer I run pfSense on. Even on IPv4, my address is virtually static and the host name will only change when I change hardware.

                                      PfSense running on Qotom mini PC
                                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                      UniFi AC-Lite access point

                                      I haven't lost my mind. It's around here...somewhere...

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        JKnott @johnpoz
                                        last edited by Jul 3, 2022, 12:50 PM

                                        @johnpoz said in Providing isolation between Vlans!:

                                        I just don't see it as actually needed as of yet. I agree its the future for sure

                                        It's that attitude that keeps it "in the future".

                                        PfSense running on Qotom mini PC
                                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                        UniFi AC-Lite access point

                                        I haven't lost my mind. It's around here...somewhere...

                                        J T 2 Replies Last reply Jul 3, 2022, 1:43 PM Reply Quote 0
                                        • J
                                          JKnott @the other
                                          last edited by Jul 3, 2022, 12:54 PM

                                          @the-other

                                          If you want stable addresses to use with local DNS, you can use Unique Local Addresses.

                                          PfSense running on Qotom mini PC
                                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                          UniFi AC-Lite access point

                                          I haven't lost my mind. It's around here...somewhere...

                                          1 Reply Last reply Reply Quote 0
                                          26 out of 32
                                          • First post
                                            26/32
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received