Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    "hotel mode" for an IP range?

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 5 Posters 1.0k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ Offline
      JKnott @tl5k5
      last edited by

      @tl5k5

      That's a function of the access point, not pfSense. For example, here's what it says with my TP-Link AP:

      Enable AP Isolation - Isolate all connected wireless stations so that wireless stations cannot access each other through WLAN. This function will be disabled if WDS/Bridge is enabled.

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      1 Reply Last reply Reply Quote 0
      • T Offline
        tl5k5
        last edited by

        Yes...I'm aware that is an AP function, but I'm trying to achieve a similar function with a range of IP on a LAN.

        JKnottJ 1 Reply Last reply Reply Quote 0
        • johnpozJ Offline
          johnpoz LAYER 8 Global Moderator
          last edited by johnpoz

          Yeah there really is no way to do that on your L3 router.. That is a function of L2.. Your switch(es), your AP(s)..

          Pfsense can isolate different L2s from each other, because to cross that boundary you are at L3.. which pfsense then can firewall while its routing between.

          What switch(es) do you have? Many support what is commonly called a private vlan.
          https://en.wikipedia.org/wiki/Private_VLAN

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.07 | Lab VMs 2.8, 25.07

          1 Reply Last reply Reply Quote 0
          • T Offline
            tl5k5
            last edited by

            Thanks for the info.
            I have a Dell s4048-on FTOS 9.14 and I'm connecting to Proxmox with OVS bridges.

            johnpozJ 1 Reply Last reply Reply Quote 0
            • JKnottJ Offline
              JKnott @tl5k5
              last edited by

              @tl5k5

              Doesn't your AP support that? I'm getting the impression you're trying to separate guests from regular users? Is that correct? If so, what you need is multiple SSIDs and a VLAN.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              A 1 Reply Last reply Reply Quote 0
              • johnpozJ Offline
                johnpoz LAYER 8 Global Moderator @tl5k5
                last edited by johnpoz

                @tl5k5 said in "hotel mode" for an IP range?:

                I have a Dell s4048

                Quick google sure looks like your good
                https://www.dell.com/support/manuals/us/en/04/force10-s4048-on/s4048_on_9.9.0.0_cli_pub-v1/private-vlan-pvlan?guid=guid-7e847acf-6145-40cb-a1e6-227f6cf4d47c&lang=en-us

                The private VLAN (PVLAN) feature of the Dell Networking operating software is supported on the platforms.

                Private VLANs extend the Dell Networking OS security suite by providing Layer 2 isolation between ports within the same private VLAN. A private VLAN partitions a traditional VLAN into subdomains identified by a primary and secondary VLAN pair. The Dell Networking OS private VLAN implementation is based on RFC 3069.
                For more information, refer to the following commands. The command output is augmented in Dell Networking OS version 7.8.1.0 at later to provide PVLAN data:

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                1 Reply Last reply Reply Quote 1
                • A Offline
                  akuma1x @JKnott
                  last edited by akuma1x

                  @JKnott said in "hotel mode" for an IP range?:

                  @tl5k5

                  Doesn't your AP support that? I'm getting the impression you're trying to separate guests from regular users? Is that correct? If so, what you need is multiple SSIDs and a VLAN.

                  I'm guessing that the OP is trying to keep the clients (doesn't say if they are wifi or wired) from seeing each other after they join the network. But, it's just a guess...

                  I would actually be surprised to see "wired" in a hotel setting anymore.

                  Jeff

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Offline
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    I think he was just using that as example.. Here stated here that he wants to do it on his lan.

                    @tl5k5 said in "hotel mode" for an IP range?:

                    Yes...I'm aware that is an AP function, but I'm trying to achieve a similar function with a range of IP on a LAN.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07 | Lab VMs 2.8, 25.07

                    1 Reply Last reply Reply Quote 1
                    • GertjanG Offline
                      Gertjan
                      last edited by

                      Trusted and non trusted users on the same LAN ?
                      Don't. Many have tried. None came back with a nice story.

                      pfSense has a captivate portal. Give it a separate NIC - this is not some optional choice. :
                      Keep LAN for internal and/or trusted users.
                      Easy to set up - easy to maintain.
                      You could add some complicated-sauce by adding a VLAN solution, some AP's support multiple SSID's that uses multiple VLAN's. Just one NIC will do in that case.
                      But hey, with NIC costing as much as a couple of cigarettes, why adding the sauce ?

                      I'm using myself pfSense as stated above : a LAN for the companies 'private' need, and another interface - NIC for my clients - being a hotel. Works great, for a decade or so.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • T Offline
                        tl5k5
                        last edited by

                        Thanks everyone.
                        I'm just going to separate my groups of workstations into different VLAN's. I just thought there might be a clean way to do this on the LAN.

                        Thanks again!

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Offline
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          @tl5k5 said in "hotel mode" for an IP range?:

                          I just thought there might be a clean way to do this on the LAN.

                          There is a clean way - its called private vlans. But this isolates all clients on that network from each other. If you wanted client X to talk to client Y then you would have to manipulate the ports specifically they are connected to, can not do that via IP..

                          If you don't want group A talking to group B.. Then yeah you do that via vlans, and now you can filter traffic at your L3 router..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07 | Lab VMs 2.8, 25.07

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.