Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Best way to separate IOTs from main LAN?

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bthovenB
      bthoven
      last edited by bthoven

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • bthovenB
        bthoven
        last edited by bthoven

        I followed this guide to add another wifi access point to another ethernet port with different subnet.

        existing subnet: 192.168.2.x
        new subnet: 192.168.3.x

        https://netosec.com/protect-home-network/

        The problem is devices connected to this new subnet cannot connect to internet. The gateway IP when connected is 192.168.3.1.

        The devices from existing subnet can access the devices in the new subnet, but not the other way round, as intended.

        I need another help. Thanks.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          When you add the new interface there will not be any firewall rules present which means everything will be dropped inbound.

          It looks like that guide covers adding firewall rules but you will need to have added a pass rule at a minimum to allow devices to connect out.

          Can we see a screenshot of your rules on the new subnet?

          Steve

          1 Reply Last reply Reply Quote 0
          • bthovenB
            bthoven
            last edited by

            Here they are:
            d3568fe9-472b-4bfc-80f7-be2c5688d1ce-image.png

            beced8bc-71fd-4d2e-8a02-4074e70cdbec-image.png

            fcf390f3-8596-4718-bc8f-a1c8cd518fdb-image.png

            25f5f15e-6c56-4e5a-9f42-e4c4f468e4ce-image.png

            aa877773-3db5-4a71-91ff-12764ec93dbf-image.png

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              Also if your using a vpn client to send your traffic to a vpn, and followed most of the idiot guides out there and set your outbound nat to "manual" then pfsense would not have created the required outbound nat for your new network.

              Your allow iot subnet rule is pointless.. Other than that would allow access to pfsense IP on that segment for dns.. But clients on this network don't talk to pfsense to talk to other devices on the network.

              So the rule should really just allow access to the IOT address not the network.

              Also using the bang allow, if your using a VIP, say for example the vip pfblocker creates.. That rule could have problems depending..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • bthovenB
                bthoven
                last edited by bthoven

                Thanks for your reply.

                Sorry, I'm not quite sure what to amend. I do not have VPN client set up; only VPN Server for secured remote access.

                Could you clarify more what I should set up. Even I copy the rule from LAN interface to my IOT interface, I got internet access status, but can't access any websites.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Is your Outbound NAT still set to the default 'automatic' in Firewall > NAT > Outbound?

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • bthovenB
                    bthoven
                    last edited by

                    here is the outbound
                    342d7083-b3db-40dd-b7c0-2fc632ef84d4-image.png

                    1 Reply Last reply Reply Quote 0
                    • bthovenB
                      bthoven
                      last edited by bthoven

                      I'm not sure the DNS Resolver setting is relevant. Now in Network Interfaces, I can choose LAN and Local Host. When I tried to choose ALL ans save, pfsense seems to be quite busy and I have to wait a very long time before it came back, and the setting reverts to LAN and Local Host again. I tried selecting ALL 3 times, and got the same behavior.

                      Outgoing Network Interface: WAN only.

                      2c75dc58-4313-4085-ab85-f50483cd061c-image.png

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Ah, Ok you won't have internet without DNS. You need at least Localhost, LAN and IOT set there for it to listen on.

                        By default it runs on all though so that should work. Check the system and resolver logs are setting all for errors.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • bthovenB
                          bthoven
                          last edited by bthoven

                          Thanks. I add IOT to Network Interface, press save, and it is now running.................same symptom as when I selected ALL........still waiting..............

                          bthovenB 1 Reply Last reply Reply Quote 0
                          • bthovenB
                            bthoven
                            last edited by

                            I waited for almost 10 mins and it came back without IOT selected in the Network Interface (DNS Resolver); and the Resolver stopped.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              You have to allow your clients to talk to dns if you want internet to work.. Be it the iot interface of pfsense, the lan interface... Or something external - but no internet is not going to work if you don't have dns. Unless you just going to IP address for everything ;)

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                If unbound fails to apply that change there should be some error logged either in the system or resolver logs, or both.

                                Do you have pfBlocker enabled with DNS-BL? If not that advanced option could be left over cruft.

                                Steve

                                1 Reply Last reply Reply Quote 0
                                • bthovenB
                                  bthoven @bthoven
                                  last edited by bthoven

                                  @bthoven said in Best way to separate IOTs from main LAN?:

                                  Thanks. I add IOT to Network Interface, press save, and it is now running.................same symptom as when I selected ALL........still waiting..............

                                  Hi,
                                  I solved this problem by stopping the DNS Resolver first, then additionally chose IOT interface and save. Then it registered the new setting and the resolver restarted itself.

                                  Thanks Steve and John for your help.

                                  ps. Strange, now Snort blocked Netgate forum ip 208.123.73.199. I had to remove it from the block list. :)
                                  642fd65e-cd2f-4441-a224-8a5938a45a6f-image.png

                                  1 Reply Last reply Reply Quote 0
                                  • NogBadTheBadN
                                    NogBadTheBad
                                    last edited by

                                    Have you just installed Snort, if you have I'd advise not putting it into block mode and baseline what it doesn't like.

                                    FYI here are the rules I've disabled:-

                                    Screenshot 2019-08-08 at 09.45.17.png

                                    Andy

                                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                    1 Reply Last reply Reply Quote 0
                                    • bthovenB
                                      bthoven
                                      last edited by bthoven

                                      I monitored Snort for a week before enabling block mode.

                                      Could you explain why you disabled those rules? One by one rule explanation would be great.

                                      Thanks

                                      1 Reply Last reply Reply Quote 0
                                      • NogBadTheBadN
                                        NogBadTheBad
                                        last edited by

                                        Most of the ET Policy ones are related to my IOT network, I should really tighten up $home_net now I'm running Snort on the parent interface.

                                        The SIP stuff is related to a VOIP phone sat on my network.

                                        The rest was just normal day to day traffic.

                                        Andy

                                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                        1 Reply Last reply Reply Quote 1
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.