• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Firewall rules to create a guest network

Scheduled Pinned Locked Moved Official Netgate® Hardware
29 Posts 7 Posters 10.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    Bob.Dig LAYER 8 @akuma1x
    last edited by Bob.Dig Aug 14, 2020, 5:34 PM Aug 14, 2020, 5:24 PM

    @akuma1x That is some advanced ruling.
    I like it. 🤓
    Although, if you have a cable-modem, it will probably not blocked by this.

    A 1 Reply Last reply Aug 14, 2020, 6:46 PM Reply Quote 0
    • A
      akuma1x @Bob.Dig
      last edited by Aug 14, 2020, 6:46 PM

      @Bob-Dig said in Firewall rules to create a guest network:

      Although, if you have a cable-modem, it will probably not blocked by this.

      I don't understand what you mean here... And, I've got a DSL internet connection.

      Jeff

      B 1 Reply Last reply Aug 14, 2020, 6:49 PM Reply Quote 0
      • B
        Bob.Dig LAYER 8 @akuma1x
        last edited by Aug 14, 2020, 6:49 PM

        @akuma1x I just thought about the block of WAN net and why someone would want that, but my "explanation" for that was wrong.

        1 Reply Last reply Reply Quote 0
        • S
          stephenw10 Netgate Administrator
          last edited by Aug 15, 2020, 8:14 PM

          You would usually block the WAN subnet because it includes the WAN address and any VIPs you have on it which would otherwise allow GUEST hosts to access the firewall services listening on those. You can also use the system alias 'This firewall' for that and that also includes all other firewall IPs. For exmaple:

          Selection_886.png

          In that case I have to allow DNS access to the firewall because it would otherwise be passed by the policy routing load-balance rule which would send it out of the WAN uselessly.

          The LOCAL alias contains all my local subnets.

          Steve

          1 Reply Last reply Reply Quote 1
          • W
            wintok
            last edited by Aug 18, 2020, 3:56 AM

            I highly recommend implement VLANs to isolate your guest and office traffic since pfsense (installed on netgate hardware or desktop) is very much capable of doing that.

            from the guest vlan you can simply block access to office vlan + pfsense, etc. And to allow access to Internet create another allow rule and put it below the block rule.

            refer to the links below to help get your idea about vlans
            https://www.youtube.com/watch?v=CDUyMpBC8bw

            1 Reply Last reply Reply Quote 0
            • N
              netblues @akuma1x
              last edited by netblues Aug 18, 2020, 4:44 AM Aug 18, 2020, 4:42 AM

              @akuma1x said in Firewall rules to create a guest network:

              and keeps my kids game boxes off the guest wifi network.
              This won't happen with a rule on the guest network.

              /

              You have to filter them on the interface they are connected.

              A 1 Reply Last reply Aug 18, 2020, 2:14 PM Reply Quote 0
              • W
                wintok @DrPhil
                last edited by Aug 18, 2020, 5:38 AM

                @DrPhil
                Both SSID you see are on the same network. Your router supports dual band. One SSID is 2.4 GHz and the other is 5GHz. Your laptop or smart-phone is probably seeing both bands ... older devices can see 2.4 GHz only ... I don't understand if there is really an option in your router that can isolate the traffic being grey out

                1 Reply Last reply Reply Quote 0
                • W
                  wintok @DrPhil
                  last edited by Aug 18, 2020, 5:46 AM

                  @DrPhil
                  You can try create another alias for static IPs and name it LAN_Statics and populate it with a list of static ips. Then in the block rule you've already created set the source to LAN_Statics. Also make this rule as the second (below the default Anti-Lockout Rule).

                  W 1 Reply Last reply Aug 18, 2020, 5:48 AM Reply Quote 0
                  • W
                    wintok @wintok
                    last edited by Aug 18, 2020, 5:48 AM

                    @wintok said in Firewall rules to create a guest network:

                    @DrPhil
                    You can try create another alias for static IPs and name it LAN_Statics and populate it with a list of static ips. Then in the block rule you've already created set the destination to LAN_Statics. Also make this rule as the second (below the default Anti-Lockout Rule).

                    1 Reply Last reply Reply Quote 0
                    • A
                      akuma1x @netblues
                      last edited by akuma1x Aug 18, 2020, 2:15 PM Aug 18, 2020, 2:14 PM

                      @netblues said in Firewall rules to create a guest network:

                      @akuma1x said in Firewall rules to create a guest network:

                      and keeps my kids game boxes off the guest wifi network.
                      This won't happen with a rule on the guest network.

                      /

                      You have to filter them on the interface they are connected.

                      Um, yes it does. If they happen to join the guest wifi network ('cuz the password is hanging on a bulletin board in the kitchen for guests to see) with their game boxes, they get assigned an IP address. It is with this IP address that I can then set NO ACCESS and block them from getting to any other destination. Essentially, it's a dead end. I don't know if this is the best way to accomplish my goal, but it works and is pretty simple to implement.

                      On the interface they are connected to 99.9% of the time, the LAN network, there is filtering there for the game boxes, like throttling and scheduling. Works perfectly.

                      Jeff

                      1 Reply Last reply Reply Quote 0
                      • C
                        chrcoluk
                        last edited by chrcoluk Aug 18, 2020, 2:45 PM Aug 18, 2020, 2:36 PM

                        As requested I will post screenshots, but I think this is still a WIP as some of these rules are set automatically internally, so I could cleanup, and I notice also that I have ALTQ queues defined when ALTQ is off now, but hopefully gives you an idea what I meant.

                        Managementports alias points to ports 80,443,22 to block ssh, and webui access to firewall.

                        guest_ntp_dns points to ports 53,123,853 to allow dns/ntp access on firewall.

                        The nolog rule near bottom is to disable logging for some extra packets that get blocked from the walled garden setup, and were been logged because I decided to log the blocked packets, so that was to disable logging for those packets.

                        Guest_ports is allowed ports on walled garden, its an expansive list as I include ports for some android and social media apps as well as email. Will attach pic for it also.

                        Also as has been pointed out, you need to have the ability to have an isolated WAP setup that uses the guest VLAN. Unless you ok with all wifi clients been on the main LAN.

                        alt text

                        alt text

                        pfSense CE 2.7.2

                        1 Reply Last reply Reply Quote 1
                        29 out of 29
                        • First post
                          29/29
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received