Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Providing isolation between Vlans!

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    32 Posts 9 Posters 4.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @JKnott
      last edited by

      @jknott I don't know what you think those rules are going to allow, your first rule there is block rfc1918 source.. Which is before icmp, so only thing that would work is IPv6 ping.

      So unless you have some floating those rules make no sense. How is bogon going to be source to your wifi vlan interface?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @johnpoz
        last edited by

        @johnpoz

        Ooops! I copied the wrong rules. Here's what I meant to post. The other one is my WAN rules.

        These are my guest WiFi rules.

        9ac12615-e439-4c6f-b7b3-41d678ff7fbc-image.png

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        johnpozJ Bob.DigB 2 Replies Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @JKnott
          last edited by

          @jknott haha - ok that makes more sense ;)

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • J
            Jarhead @JKnott
            last edited by

            @jknott What's the point of the "Block All"?
            That's already there without adding that rule.

            johnpozJ JKnottJ 2 Replies Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @Jarhead
              last edited by johnpoz

              @jarhead that rule is set to not log.. So if he was logging default deny (which is default to do).. He would not log any traffic hitting that block before the default deny which would log.

              Common practice to put in rule like that so you don't log a lot of noise, I have my default log off, and just have a block rule at the end of my wan that logs only "SYN" hits.. And common UDP ports for example.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              J 1 Reply Last reply Reply Quote 0
              • J
                Jarhead @johnpoz
                last edited by

                @johnpoz Ok, gotcha. Makes sense but I would rather log blocks. Guess I won't be adding a Block All rule. ๐Ÿ˜€

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @Jarhead
                  last edited by johnpoz

                  @jarhead you can log what you want, here are my 2 rules on wan that log stuff I block, and also log some of the stuff I allow.

                  Notice the little log icons, and the gear which says I did something special with the rule - in my case I only log syn only packets, if its something other like a SA or other out of state traffic that might hit my wan I don't really care to see it.

                  And UDP - while I don't want to see all the random off the wall upd noise - I do like to see interesting UDP ports and where I am being hit from, etc.

                  examplewan.jpg

                  Anything I do not allow still hits the default deny, just not logged because I turned off the option to log default deny rule.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  J 1 Reply Last reply Reply Quote 0
                  • J
                    Jarhead @johnpoz
                    last edited by

                    @johnpoz Yeah, I got that, was just making a joke because I see no reason to add a Block All rule even if just for logging since you can just turn logging off. Yours I can see because you're logging specific things, but Block All makes no sense to me.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @Jarhead
                      last edited by johnpoz

                      @jarhead only problem is - maybe he wants to see default logs on is lan side interfaces, but not on his wan.

                      You can't just turn off not log default for specific interfaces - its all or nothing ;) So if he wants to see those logs, but not all the noise on is wan, creating your own catch all block that would be hit before the default that does not log, would accomplish that.

                      I wouldn't do it the way he is doing it either ;) But hey there are multiple ways to skin a cat..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @Jarhead
                        last edited by

                        @jarhead

                        I use block on the WAN side, instead of reject, as it makes it appear as nothing is there. A reject will tell incoming traffic it's not allowed, revealing the presence of some device. I'm not sure if the default rule is reject or block.

                        On internal rules, I use reject, not block.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        J 1 Reply Last reply Reply Quote 0
                        • J
                          Jarhead @JKnott
                          last edited by

                          @jknott It's block.

                          block.png

                          1 Reply Last reply Reply Quote 0
                          • Bob.DigB
                            Bob.Dig LAYER 8 @JKnott
                            last edited by Bob.Dig

                            @jknott said in Providing isolation between Vlans!:

                            9ac12615-e439-4c6f-b7b3-41d678ff7fbc-image.png

                            This is an interesting one: Reject "Prefix".
                            If your prefix is dynamic, like for most of us who at home get IPv6 from their ISP, it would be nice to have this feature, but not much interest so far it seems. ๐Ÿ˜ž

                            But I know, jknott will keep his prefix stable by all means and john doesn't care for IPv6 to much. ๐Ÿ˜‰

                            johnpozJ the otherT JKnottJ 3 Replies Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @Bob.Dig
                              last edited by johnpoz

                              @bob-dig said in Providing isolation between Vlans!:

                              and john doesn't care for IPv6 to much

                              Haha - not that I don't care for it, I just don't see it as actually needed as of yet. I agree its the future for sure, and its got some slick stuff going for it.. But its not something you actually need. My isp doesn't even have it ;) I play with it via HE tunnel.. Which to be honest has some huge advantages over many an isp IPv6 so called deployments..

                              Its something that everyone should play with, but if you don't have time or desire to learn its differences - sure simple solution is not worry about it.

                              When someone here actually names one resource that requires I have IPv6 that I would care to visit ;) Then sure I will turn it on for all my networks, other then my play vlans, and my pc which I just toggle it on or off if I am playing with something IPv6 related.

                              For the time being and many years into the future, its just not something a user actually needs to worry about. If they are having issues with it, it simpler to just not use it.. Nothing say you have to.

                              Here something I keep meaning to look into for example, site I use pretty often tvmaze, just doesn't work with IPv6.. It has an IPv6 address (i can ping it on IPv6), I just can get to it when I enable IPv6 on my pc. It never fails back to IPv4. Its on my list of things to investigate why ;)

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              Bob.DigB JKnottJ 2 Replies Last reply Reply Quote 0
                              • Bob.DigB
                                Bob.Dig LAYER 8 @johnpoz
                                last edited by Bob.Dig

                                @johnpoz But around the world it is different, you often only get a public and dynamic IPv6 (prefix) reachable from the outside. I will "fight" this for myself as long as I can for sure but for others, it is their reality.

                                PS: I pay one and a half bug per month for a VPS with its own dedicated IPv4-address and I am almost feeling guilty. ๐Ÿ˜“

                                1 Reply Last reply Reply Quote 0
                                • the otherT
                                  the other @Bob.Dig
                                  last edited by

                                  @bob-dig said in Providing isolation between Vlans!:

                                  it would be nice to have this feature, but not much interest so far it seems.

                                  Hello there,
                                  I have to contradict: I am VERY interested in that feature. In fact, I wouldn't know, why anyone with dynamic prefix lease from ISP can be NOT interested...
                                  ๐Ÿ˜

                                  the other

                                  pure amateur home user, no business or professional background
                                  please excuse poor english skills and typpoz :)

                                  JKnottJ 1 Reply Last reply Reply Quote 1
                                  • JKnottJ
                                    JKnott @Bob.Dig
                                    last edited by

                                    @bob-dig said in Providing isolation between Vlans!:

                                    This is an interesting one: Reject "Prefix".

                                    I manually entered that value. My ISP uses DHCPv6-PD to assign prefixes, but mine doesn't change. In fact, it has survived replacing, at different times, my modem and the computer I run pfSense on. Even on IPv4, my address is virtually static and the host name will only change when I change hardware.

                                    PfSense running on Qotom mini PC
                                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                    UniFi AC-Lite access point

                                    I haven't lost my mind. It's around here...somewhere...

                                    1 Reply Last reply Reply Quote 0
                                    • JKnottJ
                                      JKnott @johnpoz
                                      last edited by

                                      @johnpoz said in Providing isolation between Vlans!:

                                      I just don't see it as actually needed as of yet. I agree its the future for sure

                                      It's that attitude that keeps it "in the future".

                                      PfSense running on Qotom mini PC
                                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                      UniFi AC-Lite access point

                                      I haven't lost my mind. It's around here...somewhere...

                                      johnpozJ the otherT 2 Replies Last reply Reply Quote 0
                                      • JKnottJ
                                        JKnott @the other
                                        last edited by

                                        @the-other

                                        If you want stable addresses to use with local DNS, you can use Unique Local Addresses.

                                        PfSense running on Qotom mini PC
                                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                        UniFi AC-Lite access point

                                        I haven't lost my mind. It's around here...somewhere...

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @JKnott
                                          last edited by johnpoz

                                          @jknott said in Providing isolation between Vlans!:

                                          It's that attitude that keeps it "in the future".

                                          Yeah my not using it is holding up the world :) hehehe

                                          What keeps in the future is cost of migration. Without need - phones have now unlimited IPs with IPv6... So there is no reason to move the rest of the planet ;)

                                          Just like with nat when they ran out of IPv4 vs doing something about the IP shortage then - they came up with a work around ;) Guess what happens happens now, we have a work around - all the things that Need lots and lots of IPs can use IPv6.. And they will just 464XLAT them to get to the IPv4 world.. Your car will need to be connected as well - lots and lots of cars, they will use IPv6 as well.

                                          But sorry the rest of the planet is going to long drawn out process to move.. If it completes before we are dead and buried..

                                          And there is a very flourishing grey marking for the buying and selling of IPv4 space as well.. So as long as that market is viable - there is money to be made from the selling of IPv4, so it not going anywhere any time soon.

                                          So yeah - if billy bob not an IT guy, he has zero use for IPv6 currently.. Now if his isp won't give him IPv4 then he as need to work out how to use IPv6 for inbound. But guess what, most of the other uses on the planet can't get to them - and they have no desire too.

                                          Lets see one of the major players say hey - in 202X we will turn off IPv4.. So you better be on IPv6 if you want to use us. That is never going to happen, but that would drive desire for IPv6 from the user base. Like I said my isp doesn't provide it, nor have I seen any announcements of them having it even on their roadmap..

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          DerelictD JKnottJ 2 Replies Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate @johnpoz
                                            last edited by

                                            ISPs are holding back IPv6 adoption by deploying it wrong.

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            johnpozJ Bob.DigB 2 Replies Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.