Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Isolate single IP

    Scheduled Pinned Locked Moved Firewalling
    17 Posts 5 Posters 6.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jasonlitka
      last edited by

      Does your AP support VLAN tagging per SSID?  If so, setup a new SSID and assign it a tag.  If not, try having the linux box do the tagging, though this wouldn't be secure.

      I can break anything.

      1 Reply Last reply Reply Quote 0
      • I
        ieatfish
        last edited by

        @Jason:

        Does your AP support VLAN tagging per SSID?  If so, setup a new SSID and assign it a tag.  If not, try having the linux box do the tagging, though this wouldn't be secure.

        No, it doesn't support VLAN tagging. However, I think I should be able to connect this to the switch via ethernet. So I'll just do that, put it on its separate VLAN, and make the rules blocking it from the others. Anything else I need to do?

        1 Reply Last reply Reply Quote 0
        • J
          jasonlitka
          last edited by

          @ieatfish:

          @Jason:

          Does your AP support VLAN tagging per SSID?  If so, setup a new SSID and assign it a tag.  If not, try having the linux box do the tagging, though this wouldn't be secure.

          No, it doesn't support VLAN tagging. However, I think I should be able to connect this to the switch via ethernet. So I'll just do that, put it on its separate VLAN, and make the rules blocking it from the others. Anything else I need to do?

          No, if you can get it on a separate VLAN then you'd be able to block it in pfSense.

          I can break anything.

          1 Reply Last reply Reply Quote 0
          • I
            ieatfish
            last edited by

            Awesome, thanks for the help!

            1 Reply Last reply Reply Quote 0
            • panzP
              panz
              last edited by

              I've setup a third (physical OPT1 interface) adding a 3rd network card to my pfsense box.

              So:

              1st interface: WAN (Internet via PPPoE);
              2nd interface: LAN 192.168.1.0/24;
              3rd interface: WIFI_GUEST 192.168.10.10/24.

              Now I'd like to let the 3rd interface (WIFI_GUEST) access to the Internet and block all other traffic (to LAN and WebGUI).

              I had success isolating the LAN from the guest interface by setting up a rule in the WIFI_GUEST interface to allow all the traffic !not to LAN subnet / LAN interface.

              But I'd like to block the webGUI (webconfigurator) that is still accessible from the guest interface (192.168.10.0/24).

              pfSense 2.3.2-RELEASE-p1 (amd64)
              motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                pass source tcp/udp * * dest WIFI_GUEST Address DNS (53)
                reject source * * dest WIFI_GUEST Address *

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • panzP
                  panz
                  last edited by

                  "reject source * * dest WIFI_GUEST Address *"

                  Is this rule for the guest interface? If yes, this is going to block guests (?)

                  Here are my WIFI_GUEST firewall rules; I think I've overdone something  ;D

                  RULES001.jpg
                  RULES001.jpg_thumb

                  pfSense 2.3.2-RELEASE-p1 (amd64)
                  motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    @panz:

                    "reject source * * dest WIFI_GUEST Address *"

                    Is this rule for the guest interface? If yes, this is going to block guests (?)

                    Here are my WIFI_GUEST firewall rules; I think I've overdone something  ;D

                    First point:  Rules on an interface determine what traffic coming INTO the interface on which they are defined is passed/blocked/rejected/logged etc.

                    Second Point: WIFI_GUEST Net includes WIFI_GUEST address.

                    • Get rid of all the rules with a source of WIFI_GUEST Address.

                    • Get rid of all the rules with a destination of LAN Address where a similar rule exists for LAN Net (LAN Address is included in LAN Net)

                    • Change the references to 192.168.10.10 to WIFI_GUEST Address (if I'm reading the comments right)

                    • You probably only want to log packets that match a block rule, not pass rules.

                    • You probably need a rule passing DNS traffic (dest TCP/UDP 53) to wherever the DNS Server is (Probably WIFI_GUEST Address)  This pass rule should be placed before the rule that blocks or rejects traffic from WIFI_GUEST Net to that destination.

                    Do all that and post another screen shot.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • P
                      phil.davis
                      last edited by

                      and read this post, going on at the same time: http://forum.pfsense.org/index.php/topic,70890.msg387362.html#msg387362
                      Replace VLAN10 with your interface name WIFI_GUEST and, as I read it, you are both trying to achieve the same thing.

                      As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                      If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                      1 Reply Last reply Reply Quote 0
                      • panzP
                        panz
                        last edited by

                        Yes, sorry, I didn't want to cross-post: I was trying to achieve the AP isolation using a VLAN, but I found that adding a 3rd NIC to pfSense is less error prone than setting all the VLAN stuff in pfSense AND the for the router L2 managed.

                        I'm going to setup all the rules according to the suggestions and I'm wondering if the rule that blocks port 443 is still necessary after setting the first DNS allow rule.

                        pfSense 2.3.2-RELEASE-p1 (amd64)
                        motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

                        1 Reply Last reply Reply Quote 0
                        • panzP
                          panz
                          last edited by

                          These are my now "polished" rules, but I'm viewing attempts to access my LAN in the firewall logs.

                          I'm the only one testing this network now, and I'm pretty sure I'm not attempting to enter my internal LAN. Something I've omitted?

                          ![polished rules.jpg](/public/imported_attachments/1/polished rules.jpg)
                          ![polished rules.jpg_thumb](/public/imported_attachments/1/polished rules.jpg_thumb)
                          ![firewall log.jpg](/public/imported_attachments/1/firewall log.jpg)
                          ![firewall log.jpg_thumb](/public/imported_attachments/1/firewall log.jpg_thumb)

                          pfSense 2.3.2-RELEASE-p1 (amd64)
                          motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            Is it working?  Looks fine to me.  The only think I would say is Rules 3 and 4 are redundant.  Rule 4 will never be processed because rule 3 will match first and block.

                            If something wasn't trying to open a connection to a host on LAN Net, those log entries would not be there.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • P
                              phil.davis
                              last edited by

                              and rule 2 (block to port 443) could be wider - change destination port 443 to destination port * (any). Because actually if you enable other management services on pfSense (like SSH on port 22…) then you also want those blocked from WIFI_GUEST. It is easy to put a general block in place, then you won't need to remember to add more blocking if things change.

                              As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                              If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                              1 Reply Last reply Reply Quote 0
                              • panzP
                                panz
                                last edited by

                                Yes, it's working fine. I'm going to do some in depth tests now and report if there are problems. Many many thanks to all!  ;)

                                pfSense 2.3.2-RELEASE-p1 (amd64)
                                motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.