Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Lan Wifi Bridge Initial Protection? (NEWB help)

    Scheduled Pinned Locked Moved Firewalling
    33 Posts 5 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Rules on WAN protect your network from outside threats.  The default is to allow no inbound connections.

      Rules on LAN allow traffic from LAN.

      If you created a bridge consisting of WLAN and OPT1, assigned LAN to BRIDGE0, and put the necessary rules on LAN, you should be good to go.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        "Essentially, the WiFi and Wired connections all need to operate on the same local network. "

        BS other than stuff that might require broadcast name resolution.. There is no reason to put everything on the same segment.  And if that is the way you want to go about it - then again its a no brainer $20 solution get a new wifi router and use as AP.. Or better yet use the OLD device you used before you went to pfsense as just an AP..  And plug it into your network.

        For example to easy allow my ipad to find my printer via airprint which uses mdns, etc.  And bit of PITA to go across segments with - I just put my printer on the wireless segment.  Since normal PCs and such have no issues just accessing the printer via IP or fqdn, etc.

        "without a bridge while devices on both could see the internet"

        Could not see each other in what sense - network browsing in windows?  The only thing that would prevent devices in different segments talking to each other would be your firewall rules.  So here I just fired up my old xp vm that is in my dmz segment…  My box in my lan 192.168.1.0/24 can ping it by name, since I have my dns setup correctly it resolves even with just host name not fqdn - but see how it comes back fully qualified to my local.lan domain.  I can view and access any shares on the box using just hostname, etc.

        Now boxes in the dmz can not access my box, because I don't allow it via firewall rules.. So what exactly is it that you feel you need to bridge for?  Other than allowing for "broadcasts" why do your machines need to be in the same segment via a bridge?

        accessacrosssegments.png
        accessacrosssegments.png_thumb
        otherdirection.png
        otherdirection.png_thumb

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • A
          almabes
          last edited by

          @johnpoz:

          Why don't you just put wifi on its own segment/vlan – I just don't understand the fascination with bridging wifi to wired??

          OP:  I am not trying to incite a urination competition.

          I see it, too.  I think it has to do with
          A.  A general lack of understanding of what a firewall is designed to do.
          B.  A general lack of understanding of basic network security
          C.  The now deceased consumer router did it (this is an ex ROUTER!)
          D.  Geeky friend with no knowledge of security says "you need to bridge your wifi with your wired so we can play %whatever_online_game%"

          EDIT:

          @Chris.Kemper
          JohnPoz knows what he is talking about.  He is giving you excellent, FREE, advice.  You're replacing your firewall with a VERY powerful product that allows you to secure your network properly.  Use the product to increase your network security.

          I segment my network among the kids, the NAS, and the wife and me.  All can communicate, all have different security settings…All thanks to pfSense.

          1 Reply Last reply Reply Quote 0
          • C
            chris.kemper
            last edited by

            Thanks crew - I GREATLY appreciate the help.

            Lots of great info here  ;D
            I will give the Johnpoz method another go.

            We keep a great deal of sensitive business documents, personal documents, family files, etc on a NAS. My paranoia for protecting the data grows by the minute.

            My goal is to
            1 - replace my dying dd-wrt router/laughable firewall with
            2 - a much more secure router/firewall then
            3 - make it even more robust via SNORT and maybe even SquidGuard

            1 Reply Last reply Reply Quote 0
            • C
              chris.kemper
              last edited by

              In regards to network.
              I currently have everything setup via SMB
              Everything being a mix of different Linux Distros, Macs, Windows, and Android devices.

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Bridging a Wi-Fi adapter with a LAN port is a reasonable way to go on a small network if you MUST use an internal Wi-Fi adapter.

                Far too many things use broadcasts or multicasts for zeroconf.  Yes, you can get them mostly working anyway but why hassle it?

                Set a strong WPA2 password and roll with it.

                I understand the aversion to bridges.  I also understand the thought process behind segmenting Wi-Fi from the rest of the network.  But if a user just ends up with pass any any on the Wi-Fi interface because they got sick and tired of things not working what's to gain?

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • C
                  chris.kemper
                  last edited by

                  Setting LAN to 192.168.1.1/24, WiFi to 192.168.2.1/24, DHCP server on both…
                  I can access via a browser PFSENSE on 192.168.1.1 and TOWER on 192.168.1.122 from a WiFi Laptop.
                  ...however...
                  SMB/Network browsing/mapping does not work so the crucial access to files is not available!

                  Setting a BRIDGE so both LAN and WiFi both are on the 192.168.1.10-245 SMB/Network browsing/mapping works fine.

                  So it sounds like I have 3 options

                  1. Use the $75 PFSENSE Store wireless in bridge mode - why is a bridge bad if the LAN firewall rules are applied to it?
                  2. Use the $75 PFSENSE Store wireless in segmented mode - and get SMB browsing/mapping working - help?
                  3. Buy a new wireless router and plug in the WAN of the Wireless router into a switch downstream of the PFSENSE LAN.
                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    https://forum.pfsense.org/index.php?topic=81014.msg442131#msg442131

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • T
                      Trel
                      last edited by

                      @johnpoz:

                      Why don't you just put wifi on its own segment/vlan – I just don't understand the fascination with bridging wifi to wired??

                      If you're using Windows in a home enviornment, the Windows firewall blocks certain aspects if it's not on the same subnet.
                      Since you can't expect to control every machine in a home network (to make the appropriate config changes to the windows firewall) as you could in an enterprise one, if you have Wired and Wifi on separate vlans, you prevent things such as ping/filesharing/etc between machines.

                      I am currently using a bridge in this way for this reason, though, what I'll be doing as soon as I get my new switch (out of ports) is just moving my access point to a port off the main switch on my wired network and killing the bridge completely.

                      1 Reply Last reply Reply Quote 0
                      • C
                        chris.kemper
                        last edited by

                        Thanks Derelict…

                        I guess I am still a bit unclear on what is the best route...

                        Johnpoz frowns upon bridging internal wireless and lan (why?)
                        Setting up SMB across a segmented network appears to be a PITA

                        If using an external wifi router will keep me on the same segment, fine.  A bit of a shame to waste the $75 for the pfsensestore wifi card AND a chunk on a dd-wrt wifi router... BUT if this is the preferred method, fine.

                        any final words of wisdom before I pull the trigger on an external wifi router for wireless access to my LAN?

                        1 Reply Last reply Reply Quote 0
                        • C
                          chris.kemper
                          last edited by

                          @Trell - I use a STRONG WPA password and do not give it out freely.

                          I need filesharing between a mix of LAN and WIFI devices in my home:  MAC, Windows, Linux, and Android!

                          1 Reply Last reply Reply Quote 0
                          • T
                            Trel
                            last edited by

                            @chris.kemper:

                            @Trell - I use a STRONG WPA password and do not give it out freely.

                            I need filesharing between a mix of LAN and WIFI devices in my home:  MAC, Windows, Linux, and Android!

                            I was saying the same thing you were because I had to do the same setup, though I'd prefer just having my access point going off my switch, I was limited by ports during my initial setup.

                            1 Reply Last reply Reply Quote 0
                            • A
                              almabes
                              last edited by

                              If it were my network, I'd stick an external AP in for the family wireless stuff, and locate it where I got the best signal coverage.  Then use the built-in wifi in the pfSense box for untrusted "guest" access.

                              You'd get the single broadcast domain wired/wireless family stuff you want, and if there's an occasion where you have someone over that needs wifi you give the the pfSense AP password.

                              Simple and clean.

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                If the bridged interfaces are working for you why are we still talking about it?

                                Your original question was if you needed to do anything other than rules on LAN.  That answer is no.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • A
                                  almabes
                                  last edited by

                                  I must have missed that.  Oops.
                                  Opinions on network designs are like as*holes.  We all got em.

                                  Glad its working.

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    "Setting up SMB across a segmented network appears to be a PITA"

                                    What.. I just showed you accessing a smb share over a segment.. There is NOTING too it.. open up tcp 445 is such a PITA..

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      chris.kemper
                                      last edited by

                                      @johnpoz. To define PITA:
                                      With 'IPv4 TCP 445' 'pass all' '445 (MS DS)' on both LAN and WIFI I can PING across the segment fine. 
                                      Accessing a Windows share from Linux, Mac, Android works as before -> but I do not care about accessing a Windows share.

                                      Accessing a SMB share on my unraid NAS does NOT work.  I can ping the IP, but any access attempt returns a Connection Time Out / Unable to Connect to the Server.  Also, these SMB shares do not show up in the network browse.

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        almabes
                                        last edited by

                                        @chris.kemper:

                                        Accessing a SMB share on my unraid NAS does NOT work.  I can ping the IP, but any access attempt returns a Connection Time Out / Unable to Connect to the Server.  Also, these SMB shares do not show up in the network browse.

                                        Your nas device may have some time of network ACL you may need to configure.
                                        Just a guess on my part.

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          chris.kemper
                                          last edited by

                                          1 - Skipping the bridge as it appears some aversion to this exists (still researching why).
                                          2 - Done messing with the segmented network, over 18 hours in tinkering and no joy on proper SMB/Network browsing across different base operating systems.
                                          3 - Using a very cheap Wifi router with DD-WRT installed as per Derelict (thanks) - appears to work GREAT.

                                          I have a e4200 on the way along with some heatsinks and external antenna kit (6 High Gain Antennas [2x2dBi, 2x6dBi, 2x9dBi] and 6 U.Fl cables, 3 of them RG178 clip on with IPX connectors and 3 RG316 no connectors for soldering) to replace the $20 low range el cheapo special.

                                          Thanks for all the help/advice/opinions.

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate
                                            last edited by

                                            1 - Skipping the bridge as it appears some aversion to this exists (still researching why).

                                            For what it's worth, my aversions on the subject of bridging:

                                            Bridging two ethernet router ports because someone is too damn cheap to buy a switch.  You'd be surprised how often this brain damage comes up.
                                            Also, for what it's worth, my aversions to built-in Wi-Fi cards:

                                            The support is getting better but is still YEARS behind what you get with something like a Ubiquiti and it will never compare with Ruckus/Aruba and, I guess, Aerohive/Cisco, etc.

                                            Why wrestle with spotty support when you can just plug in an AP and be done?  Any decent wireless router from a big-box store will make a better AP than a wi-fi card.

                                            That, and you can't put the wi-fi and wired clients on the same subnet without a bridge…  :)

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.