Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block Internet access on static ip address

    Scheduled Pinned Locked Moved DHCP and DNS
    7 Posts 4 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Y
      yanafig
      last edited by

      I have DHCP pool with 192.168.1.100 - 192.168.1.254. I would like to provide limited internet access on that range.

      I also have static range with 192.168.1.2 - 192.168.1.99. I would like to provide unrestricted access on that range.

      My problem is that, unauthorized user can set there ip statically within the range 192.168.1.2 - 192.168.1.99 to have unrestricted access.

      My question is, how can I block unauthorized ip set statically by unauthorized user even they use that unrestricted ip range?

      I already tried the "Enable Static ARP entries" on DHCP server but it's not working. All dhcp clients cannot access the internet which is not my goal.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @yanafig
        last edited by

        @yanafig

        You can't. If pfSense supported filtering on MAC address, you might be able to do something, but it doesn't. There is nothing else to filter on. However, some managed switches can be configured to allow only authorized MACs.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        Y 1 Reply Last reply Reply Quote 0
        • Y
          yanafig @JKnott
          last edited by

          @JKnott said in Block Internet access on static ip address:

          @yanafig

          You can't. If pfSense supported filtering on MAC address, you might be able to do something, but it doesn't. There is nothing else to filter on. However, some managed switches can be configured to allow only authorized MACs.

          Is there any other ways to achieve this even using different equipment aside from pfsense? I'm just starting my network career so kindly guide me. Thanks.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            Why would you not split these vlans? And control who can connected to the unrestricted vlan..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            Y 1 Reply Last reply Reply Quote 0
            • Y
              yanafig @johnpoz
              last edited by

              @johnpoz said in Block Internet access on static ip address:

              Why would you not split these vlans? And control who can connected to the unrestricted vlan..

              Because I only have simple setup. I have ISP-->PFsense-->Unmanaged Switches.

              I can't set vlans on unamaged switches, especially on different departments

              johnpozJ 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan
                last edited by

                Filtering MAC's might help (a bit).
                The facilities that does so, is the captive portal.
                Then you could use password identification, or vouchers, or you go to the FreeRadius way using certs to be installed on the (each) user devices. That should 'non-wanted' users occupied for a while.

                Note that, in theory, you should make your LAN's accessible to non-wanted users.

                @yanafig said in Block Internet access on static ip address:

                different equipment aside from pfsense?

                If these users are all Wifi bound, you could use an access point (starts around 20 $). These have their Wifi password, can often do some basic MAC filtering.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @yanafig
                  last edited by johnpoz

                  @yanafig said in Block Internet access on static ip address:

                  Because I only have simple setup

                  Sounds like a good reason to up your equipment to support what your wanting to do..

                  You mention using something other than pfsense - when all you need is switch(es) that support vlans.

                  You mention users changing IPs, you understand its childs play to change mac as well... When you want to control like you ask, you use different vlans.. Does not matter what the users IP is nor the mac..

                  But static arp has nothing to do with your firewall rules.. You can for sure set static arp to prevent a mac from using a different IP... The control of what IPs can do via firewall rules has nothing to do with that setting.

                  You understand this could also be accomplished with dumb switches, as long as your pfsense has more than 1 nic to use for lan side networks, and or a $30-40 smart switch to put between pfsense and the dumb switches. There are multiple ways to isolate your networks.

                  isolation.jpg

                  Even dumb wireless can be added to these now different networks be it vlans or actual physical separation.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.