Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Best way to separate IOTs from main LAN?

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Yes probably, though I've never tried to do that personally. Add a printer by IP in IOS that is.

      Steve

      1 Reply Last reply Reply Quote 0
      • bthovenB
        bthoven
        last edited by bthoven

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • bthovenB
          bthoven
          last edited by bthoven

          I followed this guide to add another wifi access point to another ethernet port with different subnet.

          existing subnet: 192.168.2.x
          new subnet: 192.168.3.x

          https://netosec.com/protect-home-network/

          The problem is devices connected to this new subnet cannot connect to internet. The gateway IP when connected is 192.168.3.1.

          The devices from existing subnet can access the devices in the new subnet, but not the other way round, as intended.

          I need another help. Thanks.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            When you add the new interface there will not be any firewall rules present which means everything will be dropped inbound.

            It looks like that guide covers adding firewall rules but you will need to have added a pass rule at a minimum to allow devices to connect out.

            Can we see a screenshot of your rules on the new subnet?

            Steve

            1 Reply Last reply Reply Quote 0
            • bthovenB
              bthoven
              last edited by

              Here they are:
              d3568fe9-472b-4bfc-80f7-be2c5688d1ce-image.png

              beced8bc-71fd-4d2e-8a02-4074e70cdbec-image.png

              fcf390f3-8596-4718-bc8f-a1c8cd518fdb-image.png

              25f5f15e-6c56-4e5a-9f42-e4c4f468e4ce-image.png

              aa877773-3db5-4a71-91ff-12764ec93dbf-image.png

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                Also if your using a vpn client to send your traffic to a vpn, and followed most of the idiot guides out there and set your outbound nat to "manual" then pfsense would not have created the required outbound nat for your new network.

                Your allow iot subnet rule is pointless.. Other than that would allow access to pfsense IP on that segment for dns.. But clients on this network don't talk to pfsense to talk to other devices on the network.

                So the rule should really just allow access to the IOT address not the network.

                Also using the bang allow, if your using a VIP, say for example the vip pfblocker creates.. That rule could have problems depending..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • bthovenB
                  bthoven
                  last edited by bthoven

                  Thanks for your reply.

                  Sorry, I'm not quite sure what to amend. I do not have VPN client set up; only VPN Server for secured remote access.

                  Could you clarify more what I should set up. Even I copy the rule from LAN interface to my IOT interface, I got internet access status, but can't access any websites.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Is your Outbound NAT still set to the default 'automatic' in Firewall > NAT > Outbound?

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • bthovenB
                      bthoven
                      last edited by

                      here is the outbound
                      342d7083-b3db-40dd-b7c0-2fc632ef84d4-image.png

                      1 Reply Last reply Reply Quote 0
                      • bthovenB
                        bthoven
                        last edited by bthoven

                        I'm not sure the DNS Resolver setting is relevant. Now in Network Interfaces, I can choose LAN and Local Host. When I tried to choose ALL ans save, pfsense seems to be quite busy and I have to wait a very long time before it came back, and the setting reverts to LAN and Local Host again. I tried selecting ALL 3 times, and got the same behavior.

                        Outgoing Network Interface: WAN only.

                        2c75dc58-4313-4085-ab85-f50483cd061c-image.png

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Ah, Ok you won't have internet without DNS. You need at least Localhost, LAN and IOT set there for it to listen on.

                          By default it runs on all though so that should work. Check the system and resolver logs are setting all for errors.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • bthovenB
                            bthoven
                            last edited by bthoven

                            Thanks. I add IOT to Network Interface, press save, and it is now running.................same symptom as when I selected ALL........still waiting..............

                            bthovenB 1 Reply Last reply Reply Quote 0
                            • bthovenB
                              bthoven
                              last edited by

                              I waited for almost 10 mins and it came back without IOT selected in the Network Interface (DNS Resolver); and the Resolver stopped.

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                You have to allow your clients to talk to dns if you want internet to work.. Be it the iot interface of pfsense, the lan interface... Or something external - but no internet is not going to work if you don't have dns. Unless you just going to IP address for everything ;)

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  If unbound fails to apply that change there should be some error logged either in the system or resolver logs, or both.

                                  Do you have pfBlocker enabled with DNS-BL? If not that advanced option could be left over cruft.

                                  Steve

                                  1 Reply Last reply Reply Quote 0
                                  • bthovenB
                                    bthoven @bthoven
                                    last edited by bthoven

                                    @bthoven said in Best way to separate IOTs from main LAN?:

                                    Thanks. I add IOT to Network Interface, press save, and it is now running.................same symptom as when I selected ALL........still waiting..............

                                    Hi,
                                    I solved this problem by stopping the DNS Resolver first, then additionally chose IOT interface and save. Then it registered the new setting and the resolver restarted itself.

                                    Thanks Steve and John for your help.

                                    ps. Strange, now Snort blocked Netgate forum ip 208.123.73.199. I had to remove it from the block list. :)
                                    642fd65e-cd2f-4441-a224-8a5938a45a6f-image.png

                                    1 Reply Last reply Reply Quote 0
                                    • NogBadTheBadN
                                      NogBadTheBad
                                      last edited by

                                      Have you just installed Snort, if you have I'd advise not putting it into block mode and baseline what it doesn't like.

                                      FYI here are the rules I've disabled:-

                                      Screenshot 2019-08-08 at 09.45.17.png

                                      Andy

                                      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                      1 Reply Last reply Reply Quote 0
                                      • bthovenB
                                        bthoven
                                        last edited by bthoven

                                        I monitored Snort for a week before enabling block mode.

                                        Could you explain why you disabled those rules? One by one rule explanation would be great.

                                        Thanks

                                        1 Reply Last reply Reply Quote 0
                                        • NogBadTheBadN
                                          NogBadTheBad
                                          last edited by

                                          Most of the ET Policy ones are related to my IOT network, I should really tighten up $home_net now I'm running Snort on the parent interface.

                                          The SIP stuff is related to a VOIP phone sat on my network.

                                          The rest was just normal day to day traffic.

                                          Andy

                                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                          1 Reply Last reply Reply Quote 1
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.