Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DROP most LAN to LAN

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 5 Posters 1.6k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • pitchforkP Offline
      pitchfork
      last edited by pitchfork

      I don't want my LAN machines open to each other, with a couple of obvious and one custom exception.

      pfSense is a proxmox guest, and sits in front of proxmox (proxmox only has a LAN IP). I have openvpn setup for proxmox/pfsense access (SSH and GUI) and a single IP firewall exception for accessing both outside of openvpn.

      DNS and SMTP services are provided by the proxmox host.

      I am thinking of:

      ALLOW from LAN host to LAN any 
      ALLOW from LAN pfsense to LAN any 
      ALLOW from LAN any to host ports 25, 53
      ALLOW from LAN host X to LAN host Y
      DROP from LAN any to LAN any
      

      All LAN to WAN remains default. So my questions are:

      a) Do I have this (excuse the sloppy language above) in the right direction?

      b) Should I put the rules above or below these?
      f497c02f-d0dc-4a86-b867-534895f7e1e6-image.png

      c) Do I also need to modify these above since they are from LAN to any?

      d) Do the openvpn rules need modification? I only access the host and pfsense via openvpn.

      Thanks

      JKnottJ 1 Reply Last reply Reply Quote 0
      • chpalmerC Offline
        chpalmer
        last edited by

        Devices on your LAN pass traffic through the switch and the switch sends that traffic direct to the other LAN device. This traffic never touches the router. Why would it?

        Only traffic sent "out of net" or to a different subnet is sent to and through the router.

        Utilize your client firewalls to do what you want. Make your Windows firewalls "public".

        Triggering snowflakes one by one..
        Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

        1 Reply Last reply Reply Quote 1
        • pitchforkP Offline
          pitchfork
          last edited by pitchfork

          gotcha.

          not that it makes a diff, but all guests are ubuntu (with the debian host).

          i could use ufw on the guests, but I really didn't wanna mess with any guest firewalling rules... iptables ALLOWs everything and UFW is not even installed.

          1 Reply Last reply Reply Quote 0
          • chpalmerC Offline
            chpalmer
            last edited by

            You could always do this with vlans but then you need a layer 3 switch.. Create a "LAN" for each machine. Then you could do all kinds of subnet magic..

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            pitchforkP 1 Reply Last reply Reply Quote 0
            • pitchforkP Offline
              pitchfork @chpalmer
              last edited by

              @chpalmer Don't think a layer 3 switch is possible with a single physical machine and two NICs, but only one uplink (the other is disconnected)

              proxmox does have VLANs though, but I think it would complicate things if the VLANs are not setup in pfsense... might have to go the client firewall way

              1 Reply Last reply Reply Quote 0
              • johnpozJ Offline
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                You don't need a L3 switch to do vlans... All you need is L2 smart switch..

                But if you don't want clients talking to each other - then you could do something with private vlans.. This would be done on your switch.. Not pfsense.

                How many clients do you have?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                chpalmerC pitchforkP 2 Replies Last reply Reply Quote 0
                • chpalmerC Offline
                  chpalmer @johnpoz
                  last edited by

                  @johnpoz said in DROP most LAN to LAN:

                  You don't need a L3 switch to do vlans... All you need is L2 smart switch..

                  But if you don't want clients talking to each other - then you could do something with private vlans.. This would be done on your switch.. Not pfsense.

                  Thanks! That is good to know. I don't do VLANs at all so Im not real up to standard there. But he did mention that there were a few exceptions with machines communicating with each other..

                  with a couple of obvious and one custom exception.

                  Im thinking a firewall rule or two for these.

                  Triggering snowflakes one by one..
                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Offline
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Well if he wants some exceptions then sure vlans would be the way to do it sure.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07 | Lab VMs 2.8, 25.07

                    1 Reply Last reply Reply Quote 0
                    • pitchforkP Offline
                      pitchfork @johnpoz
                      last edited by

                      @johnpoz

                      there are less than 15 LAN clients, between containers and VMs...

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ Offline
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Still if what your wanting to do is segment your different clients so client X and Y can not talk to A and B, then yeah you put x and y in vlan 10, and a and b in in vlan 20, and then firewall between them with pfsense.

                        I sure and the F not create 15 different vlans ;)

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07 | Lab VMs 2.8, 25.07

                        1 Reply Last reply Reply Quote 1
                        • JKnottJ Offline
                          JKnott @pitchfork
                          last edited by

                          @pitchfork said in DROP most LAN to LAN:

                          don't want my LAN machines open to each other, with a couple of obvious and one custom exception.

                          There are some switches that can isolate ports so they can only talk to an uplink port. My TP-Link TL-SG105E (Johnpoz's favourite) will do that. TP-Link calls it a Multi-Tenant Unit VLAN.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          • DerelictD Offline
                            Derelict LAYER 8 Netgate
                            last edited by Derelict

                            These are VMs/Containers. Any isolation would have to be done in the vswitch. Or perhaps in the proxmox firewall.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.