• 0 Votes
    6 Posts
    3k Views
    D

    @coxhaus okay got it all figured out (refuse DHCP to unrecognized MACs, and firewall rules to block IPs outside of your range.) this worked very well and I was able to use the Access Control on the netgear as well so that WIFI clients could not connect either.

    I am now completely up and running, I have addressed my speed issue by just getting Intel (ET PRO 1000) dual Ethernet adapter and just disabled RealTek Nic's. I am now getting the speeds I am paying for and I can see that everything inbound is block, no new devices can connect very happy camper here,

    28db92cd-b0c5-40a5-aba3-14a4ad01651e-image.png

  • 0 Votes
    39 Posts
    4k Views
    JonathanLeeJ

    @stephenw10 yes we can agree the user can configure it wrong all over. Again, an administrator might fat finger a large static DHCP list with a couple entries thus causing hostname mix ups. That for one would be very hard to pinpoint. Moreover, we know the amount of hours system administrators work. It's a lot of hours. This would make PfSense have a ease of use software functionality built in. I assumed that if pfSense allowed multiple duplicate entries, it was done for a situation when two devices need to be swapped in and out and need the same IP address, in this mindset PfSense should still log the correct hostnames. Again, if that was the reason for PfSense allowing the GUI duplicate entries.

    Weird thing to research, but the hostnames mixup was what I was after and or why
    PfSense would allow the duplicate entries in the first place. Let's agree admins have monster static dhcp lists that are updated and changed all the time within a secure setting. This situation would want controls in place for hostnames. Finally, logs for the hostnames could get bonkered up and with a monster list and that would be hard to track down why hostnames are wrong. We know PfSense now has experimental layer 2 Ethernet filtering.

  • 0 Votes
    5 Posts
    645 Views
    JonathanLeeJ

    Screenshot 2023-06-15 at 2.40.04 PM.png
    (Blocked IPV6 as my ISP does not hand out IPV6 addresses only IPv4)

    Per Netgate docs
    "Ethernet rules can use Aliases for L3 source/destination matching but there is no support for MAC Address aliases at this time."

    This works and shows traffic. Each IP has its MAC recorded into the rule.

    Working config, Squid, Squidguard, Snort, Lightsquid, Auth-NTP, DNS over port 853, Clam-AV, UpNp for xbox alongside floating Queue CODEL this is functional and other ACLs are still working with this version. I have set the top line to block out all IPV6

    Test now running for 24 hours no issues.

  • 0 Votes
    3 Posts
    2k Views
    D

    @danicavini
    Thanks, i will try it !

  • SG-2100 MAC Based VLAN Possible?

    L2/Switching/VLANs
    3
    0 Votes
    3 Posts
    1k Views
    keyserK

    @fcs001fcs No, as far as I know there is no Mac-Auth L2 support on ports in pfSense.

  • 0 Votes
    13 Posts
    2k Views
    stephenw10S

    Yes you could use pools in one subnet and filter them differently using aliases but you can't filter traffic between the clients on one subnet that way. Traffic would just go between them directly without passing through pfSense. Only one interface.
    Really you need to use VLANs in there to separate the traffic at layer 2.

    Steve

  • 0 Votes
    2 Posts
    778 Views
    A

    @brightwolf You can set a custom MAC address after you enable an interface.

    screenshot673423.png

    5th line down, under the specific interface settings screen.

    Jeff