Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Securing VLANs

    Scheduled Pinned Locked Moved Firewalling
    4 Posts 3 Posters 643 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      Charlie48
      last edited by Charlie48

      I am fairly new to computer networks.
      On PfSense (and the switch), I set up a few VLANs to segment my home network.
      In FW, I set the rules so that the networks do not see each other.
      Basically the thing works: from other VLANs ping doesn't work, I can't access shares, printers, etc.
      The problem, though, is that I've obviously set something wrong:
      In an IoT VLAN, I have a Logitech Harmony hub that can still communicate with my phone, which is in another VLAN.
      By my logic, a phone in VLAN LAN and logitech harmony in VLAN 20 (IoT) should not communicate.
      I also watch alerts in Surikata, on LAN network (192.168.10.0) a device from the IoT VLAN (192.168.20.0) appears under the alerts.
      I am attaching some Screenshots.
      Please advice :)
      Capture2.JPG Capture.JPG 8.JPG 7.JPG 6.JPG 5.JPG 4.JPG 3.JPG

      1 Reply Last reply Reply Quote 0
      • bmeeksB Offline
        bmeeks
        last edited by bmeeks

        Just so you know, Suricata does not respect VLANs. It will run on the parent physical interface and see ALL traffic passing over the interface. That includes any defined VLANs on that interface.

        So while you can appear to "select" just a specific VLAN interface to put Suricata on, the practical result (since it always runs on the physical interface) is that Suricata (and Snort, too, when used) sees all the traffic for all the VLANs defined on the interface.

        1 Reply Last reply Reply Quote 1
        • Bob.DigB Offline
          Bob.Dig LAYER 8
          last edited by

          Your rules look "ok", so it maybe was just an old state, kill states or reboot firewall for immediate effects.
          Or they use the internet for communication.

          1 Reply Last reply Reply Quote 1
          • C Offline
            Charlie48
            last edited by Charlie48

            thanks for the explanation about Suricata.

            You were right, if I turn off DNS on VLAN20 (IoT), the communication between harmony and the phone no longer works, so they communicate over the Internet and not the LAN.

            Thanks!

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.