Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    Prohibit communication between VLANs

    Firewalling
    3
    6
    173
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • morgenstern
      morgenstern last edited by morgenstern

      Hi guys, I'm setting up five VLANs piggybacking on a single physical LAN interface.

      I am trying to stop the VLANs from talking to each other as well as being able to reach the LAN (management) network. For example:

      6dc89329-020e-4653-af13-de7664306e71-image.png

      Now sadly at this point I haven't got any devices available to connect to one of these networks so I am only using the ping function of pfSense Diagnostics. And although the rules appear to be fine, I can still ping the LAN address 172.16.40.1 from a VLAN source address.

      702bebc3-0111-4d87-b63c-4dc2eb962df7-image.png

      What am I doing wrong?

      BTW. I followed this guide to sert up the VLANs and rules:
      https://www.youtube.com/watch?v=b2w1Ywt081o

      1 Reply Last reply Reply Quote 0
      • V
        viragomann last edited by

        No user rule can block traffic from pfSense itself. That is to say, you cannot test your rules with the ping function of pfSense.

        Instead of adding a filter rule for each unique of your networks you can add all network to a single alias and use this at destination in a single block rule.
        Best practice is to add an alias and add all RFC 1918 networks to it and use this one. So you're save as well, if you add a VLAN or change a network.

        1 Reply Last reply Reply Quote 1
        • morgenstern
          morgenstern last edited by

          @viragomann said in Prohibit communication between VLANs:

          No user rule can block traffic from pfSense itself. That is to say, you cannot test your rules with the ping function of pfSense.

          Ha! So I am not going mad then!

          @viragomann said in Prohibit communication between VLANs:

          Instead of adding a filter rule for each unique of your networks you can add all network to a single alias and use this at destination in a single block rule.
          Best practice is to add an alias and add all RFC 1918 networks to it and use this one. So you're save as well, if you add a VLAN or change a network.

          Yes, that would have saved me a lot of work lol. I have been setting the rulesets manually for each VLAN!

          1 Reply Last reply Reply Quote 0
          • V
            viragomann last edited by

            Another way to save time when roll out similar rules on multiple interfaces is to use the copy function:
            522e8083-451d-4978-912f-dd6ad4d3c31d-grafik.png

            Just hit the button, a copy of the rule will be opened. Then change the interface. Together with the RFC1918 alias that's all you have to do to add the rules to another interface.

            morgenstern 1 Reply Last reply Reply Quote 1
            • morgenstern
              morgenstern @viragomann last edited by

              @viragomann Excellent! Thanks!

              1 Reply Last reply Reply Quote 0
              • johnpoz
                johnpoz LAYER 8 Global Moderator last edited by

                Yet another way to save time would be to put your networks in an alias and use that in a single rule vs multiple rules.

                I have an alias with all of rfc1918 space in it, so if I want to block a specific vlan from talking to other vlans I just use that as the destination..

                There are multiple ways to skin a cat ;)

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 23.01 | Lab VMs CE 2.6, 2.7

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post