Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    More efficient way to block other VLANs?

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 5 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jarhead @mcury
      last edited by

      @mcury You don't need to know the IP's. Just the ports.

      M 1 Reply Last reply Reply Quote 0
      • M
        mcury @Jarhead
        last edited by

        @jarhead said in More efficient way to block other VLANs?:

        @mcury You don't need to know the IP's. Just the ports.

        Isn't that an allow all ?
        SRC LAN_NET to * ?

        We are not speaking about ports here

        dead on arrival, nowhere to be found.

        Bob.DigB J 2 Replies Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @CreationGuy
          last edited by johnpoz

          @creationguy the simple way to block all your other vlans is to just create an alias with all the rfc1918 space in it, then use that to block all access to rfc1918 space - this assumes all your other vlans are rfc1918 space.. So unless you have routed public IP space that your using on your vlans this would take your example rules down to 2.

          1 blocking access to "this firewall" ports you want to block, and then a block rfc1918 rule. Then your allow all "internet" rule.

          rfc.jpg

          Advantage of such a alias is you auto block access to any future vlans you might add as well without having to adjust your rules.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • Bob.DigB
            Bob.Dig LAYER 8 @mcury
            last edited by Bob.Dig

            @mcury said in More efficient way to block other VLANs?:

            SRC LAN_NET to * ?

            Technically you could invert the rfc1918 for an allow rule. But I am with you.

            1 Reply Last reply Reply Quote 0
            • J
              Jarhead @mcury
              last edited by Jarhead

              @mcury said in More efficient way to block other VLANs?:

              @jarhead said in More efficient way to block other VLANs?:

              @mcury You don't need to know the IP's. Just the ports.

              Isn't that an allow all ?
              SRC LAN_NET to * ?

              We are not speaking about ports here

              How is that an Allow All?
              Take my Guest Wifi.
              I only allow internet on it.

              Guest.png

              They have access to DNS, then the alias Internet_P is internet ports, 53, 80, 443, 853 and I added 123 because I use that alias in other networks and it was just easier to add it. I have to add the DNS rule even though 53 is allowed in the second rule because I block rfc1918 which would be the gateway. Everything else is blocked.

              Then there's my Camera network.
              Doesn't need internet at all so no allow all. I do have rules I toggle to allow two servers to the internet for updates but other than that, I allow NTP, whole network to an off site recorder, and access to a NAS.

              Cam.png

              But either way, I think you're missing my point. When creating rules always start with everything is blocked, what do I want to allow. Then fine tune as needed.

              As I said, don't need to know all the IP's, just the ports.

              Bob.DigB 1 Reply Last reply Reply Quote 0
              • Bob.DigB
                Bob.Dig LAYER 8 @Jarhead
                last edited by Bob.Dig

                @jarhead said in More efficient way to block other VLANs?:

                then the alias Internet_P is internet ports, 53, 80, 443, 853

                There is no internet ports. A browser can use any port and sometimes they do.
                I noticed it when I did a speed test and I was wondering, how could I archive such high numbers. The reason was that the speedtest website ran over vpn and showed my vpn IP but the speedtest itself was run on another port which was not part of my "webports". Took me some time to figure that out.

                So your inverted rfc1918 alias is doing the real "work" here, not the ports.
                Your public WAN-port is still accessible from the guest-wifi though. ๐Ÿ˜‰

                J johnpozJ 2 Replies Last reply Reply Quote 0
                • J
                  Jarhead @Bob.Dig
                  last edited by

                  @bob-dig said in More efficient way to block other VLANs?:

                  There is no internet ports.

                  Gonna have to disagree there. If I take 80 and 443 out of that alias, no more internet.

                  Your public WAN-port is still accessible from the guest-wifi though. ๐Ÿ˜‰

                  And that's fine. There's nothing there.

                  Bob.DigB 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @Bob.Dig
                    last edited by

                    @bob-dig there has been a bunch of threads about ! rules, not a fan.. While agree they can work - just makes it harder to read and there have in the past been issues with vips and bang rules.

                    I would suggest always be explicit in your blocking or allowing..

                    While I agree a !rfc1918 could be used - its just easy to read when your explicit in in your rules.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • Bob.DigB
                      Bob.Dig LAYER 8 @Jarhead
                      last edited by Bob.Dig

                      @jarhead said in More efficient way to block other VLANs?:

                      Gonna have to disagree there. If I take 80 and 443 out of that alias, no more internet.

                      But even now your guest probably can't run a speedtest like Ookla.
                      I think this is unacceptable. ๐Ÿ˜‰

                      @johnpoz Still never used a vip.

                      But in the end, if you make your rules tighter (e.g. with ports) it should be more secure.
                      So I am with @Jarhead too.

                      J 1 Reply Last reply Reply Quote 1
                      • J
                        Jarhead @Bob.Dig
                        last edited by

                        @bob-dig said in More efficient way to block other VLANs?:

                        But even now your guest probably can't run a speedtest like Ookla.
                        I think this is unacceptable. ๐Ÿ˜‰

                        Honestly, not really sure I would want a guest that would need to run a speedtest on my internet... get your own damn internet for that!! ๐Ÿ˜‚

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.