Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DROP most LAN to LAN

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 5 Posters 1.6k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • chpalmerC Offline
      chpalmer
      last edited by

      Devices on your LAN pass traffic through the switch and the switch sends that traffic direct to the other LAN device. This traffic never touches the router. Why would it?

      Only traffic sent "out of net" or to a different subnet is sent to and through the router.

      Utilize your client firewalls to do what you want. Make your Windows firewalls "public".

      Triggering snowflakes one by one..
      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

      1 Reply Last reply Reply Quote 1
      • pitchforkP Offline
        pitchfork
        last edited by pitchfork

        gotcha.

        not that it makes a diff, but all guests are ubuntu (with the debian host).

        i could use ufw on the guests, but I really didn't wanna mess with any guest firewalling rules... iptables ALLOWs everything and UFW is not even installed.

        1 Reply Last reply Reply Quote 0
        • chpalmerC Offline
          chpalmer
          last edited by

          You could always do this with vlans but then you need a layer 3 switch.. Create a "LAN" for each machine. Then you could do all kinds of subnet magic..

          Triggering snowflakes one by one..
          Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

          pitchforkP 1 Reply Last reply Reply Quote 0
          • pitchforkP Offline
            pitchfork @chpalmer
            last edited by

            @chpalmer Don't think a layer 3 switch is possible with a single physical machine and two NICs, but only one uplink (the other is disconnected)

            proxmox does have VLANs though, but I think it would complicate things if the VLANs are not setup in pfsense... might have to go the client firewall way

            1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              You don't need a L3 switch to do vlans... All you need is L2 smart switch..

              But if you don't want clients talking to each other - then you could do something with private vlans.. This would be done on your switch.. Not pfsense.

              How many clients do you have?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07 | Lab VMs 2.8, 25.07

              chpalmerC pitchforkP 2 Replies Last reply Reply Quote 0
              • chpalmerC Offline
                chpalmer @johnpoz
                last edited by

                @johnpoz said in DROP most LAN to LAN:

                You don't need a L3 switch to do vlans... All you need is L2 smart switch..

                But if you don't want clients talking to each other - then you could do something with private vlans.. This would be done on your switch.. Not pfsense.

                Thanks! That is good to know. I don't do VLANs at all so Im not real up to standard there. But he did mention that there were a few exceptions with machines communicating with each other..

                with a couple of obvious and one custom exception.

                Im thinking a firewall rule or two for these.

                Triggering snowflakes one by one..
                Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Well if he wants some exceptions then sure vlans would be the way to do it sure.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07 | Lab VMs 2.8, 25.07

                  1 Reply Last reply Reply Quote 0
                  • pitchforkP Offline
                    pitchfork @johnpoz
                    last edited by

                    @johnpoz

                    there are less than 15 LAN clients, between containers and VMs...

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Offline
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Still if what your wanting to do is segment your different clients so client X and Y can not talk to A and B, then yeah you put x and y in vlan 10, and a and b in in vlan 20, and then firewall between them with pfsense.

                      I sure and the F not create 15 different vlans ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      1 Reply Last reply Reply Quote 1
                      • JKnottJ Offline
                        JKnott @pitchfork
                        last edited by

                        @pitchfork said in DROP most LAN to LAN:

                        don't want my LAN machines open to each other, with a couple of obvious and one custom exception.

                        There are some switches that can isolate ports so they can only talk to an uplink port. My TP-Link TL-SG105E (Johnpoz's favourite) will do that. TP-Link calls it a Multi-Tenant Unit VLAN.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • DerelictD Offline
                          Derelict LAYER 8 Netgate
                          last edited by Derelict

                          These are VMs/Containers. Any isolation would have to be done in the vswitch. Or perhaps in the proxmox firewall.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.