Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Netgate 2100 - setup question

    Official Netgate® Hardware
    6
    67
    10.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Yes, if you had the switch connected to ports 3 and 4.
      The switch in the 2100 does not support STP to prevent that.

      Steve

      N 1 Reply Last reply Reply Quote 0
      • N
        netboy @stephenw10
        last edited by netboy

        @stephenw10 What is STP? Yes port 3 and port 4 are connected to "separate" unmanaged switches so that anything connected to the switch has the 172 subnet.

        This was my idea right from beginning.

        Are you telling me that I cannot connect any switch to port 3 and 4?

        Please note that port 3 is disconnected right now and port 4 is connected to a unmanaged switch. This configuration does not choke up web GUI but once I connect port 3 to a switch the web GUI chokes up.

        Kindly advice

        R 1 Reply Last reply Reply Quote 0
        • R
          rcoleman-netgate Netgate @netboy
          last edited by

          @netboy said in Netgate 2100 - setup question:

          What is STP?

          Spanning Tree Protocol.

          If you have a link from one network going into another, it cannot detect that and mitigate the cross-talk.

          You can connect a switch to those ports, yes, but I was asking you what the rest of those are connected to -- is it possible that one of those switches is connected to port 1 or 2?

          Ryan
          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
          Requesting firmware for your Netgate device? https://go.netgate.com
          Switching: Mikrotik, Netgear, Extreme
          Wireless: Aruba, Ubiquiti

          N 1 Reply Last reply Reply Quote 0
          • N
            netboy @rcoleman-netgate
            last edited by

            @rcoleman-netgate You are on the money!!! I had daisy chained the switch which was in port 1 and port 3 because my standby router had only one port and was waiting for 2100 to arrive. Newbie mistake!!! Thanks for pointing this out!

            I have now removed the daisy chain ethernet cable connecting switches which were in port 3 and port 1.

            Web gui works fine.

            Thank you for baby sitting me!

            R 1 Reply Last reply Reply Quote 1
            • R
              rcoleman-netgate Netgate @netboy
              last edited by

              @netboy Yeah, don't do that :) It does bad things -- as you have seen. :)

              Ryan
              Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
              Requesting firmware for your Netgate device? https://go.netgate.com
              Switching: Mikrotik, Netgear, Extreme
              Wireless: Aruba, Ubiquiti

              N 1 Reply Last reply Reply Quote 0
              • N
                netboy @rcoleman-netgate
                last edited by netboy

                @rcoleman-netgate I need help in firewall rules.

                I want 192.16.0.XXX subnet to go to internet and talk to 172.16.0.XXX subnet but I want to BLOCK 172.16.0.xxx to 192 subnet - 172 can talk to internet (allow). This is my existing firewall rules.

                IoTP4 is 172.16.0.XXX

                4d6980c6-6e4c-47e0-b623-5d278fd97bc3-image.png

                d4112993-8b0e-4c0a-8657-aab353240795-image.png

                38124c13-4538-4757-a44c-b2c05a954a42-image.png

                R 1 Reply Last reply Reply Quote 0
                • R
                  rcoleman-netgate Netgate @netboy
                  last edited by

                  @netboy So block on LAN interface anything with a SOURCE address of IOTP4 Network. Put that above your "allow all traffic" rule

                  Ryan
                  Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                  Requesting firmware for your Netgate device? https://go.netgate.com
                  Switching: Mikrotik, Netgear, Extreme
                  Wireless: Aruba, Ubiquiti

                  N 1 Reply Last reply Reply Quote 0
                  • N
                    netboy @rcoleman-netgate
                    last edited by netboy

                    @rcoleman-netgate on the LAN firewall (192) BLOCK IoT (172) and this must be the FIRST rule. Have I got it right? On drop down there are two options IOTP4 address and IOTP4 net - which one to select as source

                    Below correct?

                    e08ec21a-9b3c-4b6b-9064-92bb20e99fa8-image.png

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      rcoleman-netgate Netgate @netboy
                      last edited by rcoleman-netgate

                      @netboy That will only block HTTP and HTTPS but not Ping or DNS

                      Set the traffic to ANY type, not TCP.

                      And, as I said, IOT Network, not IOT Address :)

                      Ryan
                      Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                      Requesting firmware for your Netgate device? https://go.netgate.com
                      Switching: Mikrotik, Netgear, Extreme
                      Wireless: Aruba, Ubiquiti

                      N 1 Reply Last reply Reply Quote 0
                      • N
                        netboy @rcoleman-netgate
                        last edited by

                        @rcoleman-netgate
                        Is this correct? The order ok?

                        c6bd482f-02a0-4a64-91b2-03c056b85625-image.png

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          rcoleman-netgate Netgate @netboy
                          last edited by

                          @netboy Needs to be IOTP4 Network, not address.

                          Ryan
                          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                          Requesting firmware for your Netgate device? https://go.netgate.com
                          Switching: Mikrotik, Netgear, Extreme
                          Wireless: Aruba, Ubiquiti

                          N 1 Reply Last reply Reply Quote 0
                          • N
                            netboy @rcoleman-netgate
                            last edited by

                            @rcoleman-netgate got it

                            This ok?

                            4248567e-80f3-4adf-9eb5-bcebff1605f6-image.png

                            R 1 Reply Last reply Reply Quote 0
                            • R
                              rcoleman-netgate Netgate @netboy
                              last edited by

                              @netboy Should be. Plug into the IOTP4 network and try to access anything on the LAN network (pf GUI on that IP, ping, etc.)

                              it should block, and when you come back the

                              0 / 0 B
                              

                              in the states column should increment.

                              Ryan
                              Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                              Requesting firmware for your Netgate device? https://go.netgate.com
                              Switching: Mikrotik, Netgear, Extreme
                              Wireless: Aruba, Ubiquiti

                              N 1 Reply Last reply Reply Quote 0
                              • N
                                netboy @rcoleman-netgate
                                last edited by

                                @rcoleman-netgate Did not work - please see screen shot below

                                6b5f8147-a569-415d-a74f-ecf1b8e33691-image.png

                                R 1 Reply Last reply Reply Quote 0
                                • R
                                  rcoleman-netgate Netgate @netboy
                                  last edited by

                                  @netboy ede0256f-99fd-48dd-9d2d-9bf343ff18d0-image.png

                                  Automatically Select == use the network based on the IP you're pinging. Switch that to "IOTP4"

                                  Ryan
                                  Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                                  Requesting firmware for your Netgate device? https://go.netgate.com
                                  Switching: Mikrotik, Netgear, Extreme
                                  Wireless: Aruba, Ubiquiti

                                  N 1 Reply Last reply Reply Quote 0
                                  • N
                                    netboy @rcoleman-netgate
                                    last edited by

                                    @rcoleman-netgate 96c4538b-0abf-49b6-b411-42736c54471c-image.png

                                    Able to ping after pointing source address to IOTP4

                                    N 2 Replies Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      You should move that rule from the LAN interface to the IOTP4 interface.

                                      Connections are opened from there and that's where they need to be blocked.

                                      You probably also want the destination to be LANnet so that all hosts in the LAN subnet are blocked.
                                      I would also choose to use a reject rule rather than block there so that clients on the IOTP4 subnet see the connection as refused imediately rather than having to timeout. It just makes failures easier to handle for devices mistakenly trying to access LAN.

                                      You need to test it from a device on the IOTP4 subnet so that the traffic goes through the IOTP4 firewall rules.

                                      Steve

                                      1 Reply Last reply Reply Quote 0
                                      • N
                                        netboy @netboy
                                        last edited by

                                        This post is deleted!
                                        1 Reply Last reply Reply Quote 0
                                        • N
                                          netboy @netboy
                                          last edited by

                                          @netboy OK

                                          Removed BLOCK rule from LAN interface and included this

                                          03bbbffe-c685-4481-bf5f-fd62b4196f45-image.png

                                          Shall I apply this and test?

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            That will work. I would set the protocol to 'any' though to include ping etc.

                                            N 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.