Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Solved] Would firewall rules allow local traffic if client isolation is on

    Firewalling
    5
    17
    2.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      doktornotor Banned
      last edited by

      That traffic will never hit the firewall.

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        @doktornotor:

        That traffic will never hit the firewall.

        ^this

        Traffic in the same subnet goes via layer 2. In the case of wireless clients, that traffic would never leave the AP, let alone reach the firewall.

        Remember: Upvote with the šŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • T
          Trel
          last edited by

          Ah ok, I was hoping that if it wasn't allowed at the switch level (or the AP) it would just get forwarded to the Firewall.

          I need to get a better AP that allows for selective client isolation.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            wireless selective client isolation?

            So you want wireless client A to not be able to talk to B and C, but you want say B and C to be able to talk to each other?

            I would just put the clients you don't want talking to each other on ssid 1 turn on isolation, and clients you want to talk to each other ssid 2 and don't enable isolation.

            If you put these ssids on different vlans, then you can route that traffic through pfsense at layer 3 and allow whatever traffic you want as selective as you want via IP address of the clients in question.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              That's what I'd do also. Put the untrusted clients on untrusted SSID with isolation and the others on an SSID that allows full communication.

              Remember: Upvote with the šŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • T
                Trel
                last edited by

                @jimp:

                That's what I'd do also. Put the untrusted clients on untrusted SSID with isolation and the others on an SSID that allows full communication.

                That's what I would do too if I had control over the machines, but this is on my guest network (which is why I have client isolation on) but one machine needed to be able to do files shares to another.Ā  And putting them on two SSIDs wasn't possible as the Windows Firewall doesn't like allowing that communication across subnets.

                (If I controlled the machines I could change the Windows firewall to allow for this option, but then again, if I controlled the machines, they wouldn't be on the guest network to begin with)

                Oh well, I'll either have to get an AP that does allow for selective isolation, or just tell them it's not possible unless they want to hardwire in.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  I have never in all my years of networking and wireless before B even heard of this selective isolation your talking about..

                  As to the windows firewall not allowing communication across subnets?? What??Ā  Where did you pick up that nugget of FUD??

                  So these users that want to share files don't even know how to manage their own firewalls?

                  Why don't you just create another SSID for them that doesn't have isolation on that is still isolated from your network?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    The closest thing to selective isolation I have seen is Private VLANs that have the concept of promiscuous, isolated, and community ports.Ā  Trouble is, to have success, ALL devices participating need to understand private VLANs and, in particular, trunking them.Ā  Pretty easy to find switches that support it, but I have yet to see endpoint devices (such as multi-SSID APs) that understand them in any meaningful way.

                    You might be able to accomplish what you're looking for with multiple SSIDs, as has been said.Ā  Some APs have a setting to isolate one SSID but not another.

                    To be honest, you're asking a lot.Ā  You have isolation in the radios, in the switches, and on any uplinks, all have to play together and all have to know that Alice should be able to talk to Bob, Bob to Alice, but neither should be able to talk to Charlie - on the same layer 2 network.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      While I agree in say a hotel setting or starbucks isolation of clients is a good thing to do..Ā  If your on a network where users want to talk to each other for wireless just create a ssid for them that does not have isolation on. Users that wand to talk to each other use that SSID, users that don't want to talk to each other use the other SSID.

                      It really is that simple..

                      As Derelict stated what your asking for is pretty freaking complicated..Ā  Now pretty much any modern managed switch will provide for private vlans, Once you throw in the mix of AP or even multiple APs never seen it where you could selectively change the isolation and say client a could talk to b but b and a could not talk to c, etc..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • T
                        Trel
                        last edited by

                        @johnpoz:

                        I have never in all my years of networking and wireless before B even heard of this selective isolation your talking about..

                        As to the windows firewall not allowing communication across subnets?? What??Ā  Where did you pick up that nugget of FUD??

                        From Windows itself.Ā  See the attached picture for the default private network SMB-In rule.

                        So these users that want to share files don't even know how to manage their own firewalls?

                        Not at all, these are people who would talk about Mozzarella Fox Fire.

                        Why don't you just create another SSID for them that doesn't have isolation on that is still isolated from your network?

                        The current setup doesn't support multi-SSID.

                        Either way, if it's not possible, it's not a problem.Ā  I was just asking if it was.

                        default_file_share.jpg
                        default_file_share.jpg_thumb

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          that is a setting in the firewall.. Change it..Ā  Or have them turn it off, its a host firewall if they don't how to manage it.. WTF they running it for? ;)

                          So looks like you need to get new AP that support multiple ssid.

                          firewallsettings.png
                          firewallsettings.png_thumb

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • T
                            Trel
                            last edited by

                            @johnpoz:

                            that is a setting in the firewall.. Change it..Ā  Or have them turn it off, its a host firewall if they don't how to manage it.. WTF they running it for? ;)

                            So looks like you need to get new AP that support multiple ssid.

                            That's what I said…
                            The Windows firewall blocks file sharing between subnets.
                            I know you can change it.
                            These are users joining a guest network because I have no control over their computer.

                            As far as the AP, I agree, but that wasn't the issue.
                            This whole thing was a yes/no question.
                            Everything else is fluff, heh.

                            tl;dr I'm good, I got my answer. Thanks for all the info.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              Ok to answer your question directly - NO!

                              there is no rule you can put in pfsense to control traffic for devices talking to each other on a segment.Ā  Pfsense is a gateway off the network segment, it has nothing to do with devices talking amongst themselves.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              1 Reply Last reply Reply Quote 0
                              • T
                                Trel
                                last edited by

                                @johnpoz:

                                Ok to answer your question directly - NO!

                                there is no rule you can put in pfsense to control traffic for devices talking to each other on a segment.Ā  Pfsense is a gateway off the network segment, it has nothing to do with devices talking amongst themselves.

                                ThanksĀ 
                                (Though my question was actually answered on like the third or fourth post.Ā  The rest of the topic was about why I was asking, not what I was asking)

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.