Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Best way to separate IOTs from main LAN?

    General pfSense Questions
    4
    24
    2.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bthovenB
      bthoven
      last edited by bthoven

      I am using HP T620 plus with 4-port intel ethernet. First port is for pfsense and second port for my on wifi access point. I have 3 unused ethernet ports (2 intel, 1 builtin RTL). I have a number of IOTs, e.g. Google Home Mini, Echo Dot, 3 Wifi switches, wifi printer, smart tv, etc.
      What is the best way to separate these IOT devices from my LAPTOP/PC/Phone?
      My pfsense now is running pfblockerng, snort, openvpn server. I also run Home Assistant on one of my mini PC; HA integrates with these IOTs.
      If VLAN is needed, how should I proceed without having to reconfig all pfsense packages.

      Thanks.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        Put them on a different subnet using a different NIC. Add firewall rules to prevent them accessing the LAN subnet.

        It won't affect anything currently installed but you might want to add new config to use the new subnet. Add it to Snort as a new interface to monitor for example.

        You might have an issue with physical connectivity setting up a completely separate subnet. VLANs would usually be employed to solve that issue, your switch(es) would need to support that.

        With a completely separate subnet the biggest issue you will likely see is 'discovering' devices from clients in the LAN. Unfortunately there are many applications that for some unknown reason only allow auto discovery. DLNA media streaming tools are common offenders.

        Steve

        1 Reply Last reply Reply Quote 0
        • bthovenB
          bthoven
          last edited by bthoven

          Thank you Steve.
          If I connect another wifi access point to another port on pfsense box for a different subnet, and connect my iots to this new subnet. Would that be sufficient? I still wonder, for example, how my pc/laptop can communicate with my wifi printer if it is now connected to a different subnet.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Yes, that would be fine.

            pfSense will route between the subnets no problem. As long as you have rules on LAN allowing your PC to connect to your printer on a different subnet it will work fine. It just won't be able to auto-discover so you will have to give the printer a static DHCP lease, so it always has the same IP, and then set it up by IP in the client to print from.

            Steve

            1 Reply Last reply Reply Quote 1
            • bthovenB
              bthoven
              last edited by bthoven

              Thanks Steve. Will the same solution can be applied to my ios devices too?

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Yes probably, though I've never tried to do that personally. Add a printer by IP in IOS that is.

                Steve

                1 Reply Last reply Reply Quote 0
                • bthovenB
                  bthoven
                  last edited by bthoven

                  This post is deleted!
                  1 Reply Last reply Reply Quote 0
                  • bthovenB
                    bthoven
                    last edited by bthoven

                    I followed this guide to add another wifi access point to another ethernet port with different subnet.

                    existing subnet: 192.168.2.x
                    new subnet: 192.168.3.x

                    https://netosec.com/protect-home-network/

                    The problem is devices connected to this new subnet cannot connect to internet. The gateway IP when connected is 192.168.3.1.

                    The devices from existing subnet can access the devices in the new subnet, but not the other way round, as intended.

                    I need another help. Thanks.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      When you add the new interface there will not be any firewall rules present which means everything will be dropped inbound.

                      It looks like that guide covers adding firewall rules but you will need to have added a pass rule at a minimum to allow devices to connect out.

                      Can we see a screenshot of your rules on the new subnet?

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • bthovenB
                        bthoven
                        last edited by

                        Here they are:
                        d3568fe9-472b-4bfc-80f7-be2c5688d1ce-image.png

                        beced8bc-71fd-4d2e-8a02-4074e70cdbec-image.png

                        fcf390f3-8596-4718-bc8f-a1c8cd518fdb-image.png

                        25f5f15e-6c56-4e5a-9f42-e4c4f468e4ce-image.png

                        aa877773-3db5-4a71-91ff-12764ec93dbf-image.png

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by johnpoz

                          Also if your using a vpn client to send your traffic to a vpn, and followed most of the idiot guides out there and set your outbound nat to "manual" then pfsense would not have created the required outbound nat for your new network.

                          Your allow iot subnet rule is pointless.. Other than that would allow access to pfsense IP on that segment for dns.. But clients on this network don't talk to pfsense to talk to other devices on the network.

                          So the rule should really just allow access to the IOT address not the network.

                          Also using the bang allow, if your using a VIP, say for example the vip pfblocker creates.. That rule could have problems depending..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • bthovenB
                            bthoven
                            last edited by bthoven

                            Thanks for your reply.

                            Sorry, I'm not quite sure what to amend. I do not have VPN client set up; only VPN Server for secured remote access.

                            Could you clarify more what I should set up. Even I copy the rule from LAN interface to my IOT interface, I got internet access status, but can't access any websites.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Is your Outbound NAT still set to the default 'automatic' in Firewall > NAT > Outbound?

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • bthovenB
                                bthoven
                                last edited by

                                here is the outbound
                                342d7083-b3db-40dd-b7c0-2fc632ef84d4-image.png

                                1 Reply Last reply Reply Quote 0
                                • bthovenB
                                  bthoven
                                  last edited by bthoven

                                  I'm not sure the DNS Resolver setting is relevant. Now in Network Interfaces, I can choose LAN and Local Host. When I tried to choose ALL ans save, pfsense seems to be quite busy and I have to wait a very long time before it came back, and the setting reverts to LAN and Local Host again. I tried selecting ALL 3 times, and got the same behavior.

                                  Outgoing Network Interface: WAN only.

                                  2c75dc58-4313-4085-ab85-f50483cd061c-image.png

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Ah, Ok you won't have internet without DNS. You need at least Localhost, LAN and IOT set there for it to listen on.

                                    By default it runs on all though so that should work. Check the system and resolver logs are setting all for errors.

                                    Steve

                                    1 Reply Last reply Reply Quote 0
                                    • bthovenB
                                      bthoven
                                      last edited by bthoven

                                      Thanks. I add IOT to Network Interface, press save, and it is now running.................same symptom as when I selected ALL........still waiting..............

                                      bthovenB 1 Reply Last reply Reply Quote 0
                                      • bthovenB
                                        bthoven
                                        last edited by

                                        I waited for almost 10 mins and it came back without IOT selected in the Network Interface (DNS Resolver); and the Resolver stopped.

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by

                                          You have to allow your clients to talk to dns if you want internet to work.. Be it the iot interface of pfsense, the lan interface... Or something external - but no internet is not going to work if you don't have dns. Unless you just going to IP address for everything ;)

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            If unbound fails to apply that change there should be some error logged either in the system or resolver logs, or both.

                                            Do you have pfBlocker enabled with DNS-BL? If not that advanced option could be left over cruft.

                                            Steve

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.