Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Guest LAN client isolation possible?

    Firewalling
    6
    11
    1.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      DominikHoffmann
      last edited by

      What can I do on the Guest LAN interface I set up to isolate clients from one another?

      I have figured out that this rule is ineffective:

      Screenshot 2023-02-16 at 12.25.21 AM.png

      because in-subnet communication does not reach the pfSense appliance and therefore its firewall.

      keyserK S 2 Replies Last reply Reply Quote 0
      • keyserK
        keyser Rebel Alliance @DominikHoffmann
        last edited by

        @dominikhoffmann said in Guest LAN client isolation possible?:

        What can I do on the Guest LAN interface I set up to isolate clients from one another?

        I have figured out that this rule is ineffective:

        Screenshot 2023-02-16 at 12.25.21 AM.png

        because in-subnet communication does not reach the pfSense appliance and therefore its firewall.

        You cannot do anything on your firewall about client to client talk within the same subnet/interface. That traffic never reaches your firewall - that’s how IP works, and has nothing to do with pfSense.

        To isolate them from each other you need a switch/Accesspoint that supports either role-based networking or private-VLAN. That’s because isolation has to be done on layer 2 (on the network layer created by your switch/AP)

        Love the no fuss of using the official appliances :-)

        1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @DominikHoffmann
          last edited by

          @dominikhoffmann Some APs will isolate that, for instance eero supports guest WiFi in eero's bridge mode, and when I tested it isolates the devices even while bridging them.

          Another option is to use a separate interface on pfSense, use a second AP and put it on that interface. Then firewall rules do apply between interfaces. Is your "guest VLAN" not a separate interface?

          (also that block rule has states so something is hitting it)

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          johnpozJ D 2 Replies Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @SteveITS
            last edited by

            @steveits said in Guest LAN client isolation possible?:

            (also that block rule has states so something is hitting it)

            Could be something trying to talk to pfsense IP, or broadcast address - but blocks rules shouldn't ever have a "state" ;) So that is odd for sure. maybe he adjusted the rule from allow to block? And there were states from when it was allow?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            D S 2 Replies Last reply Reply Quote 0
            • D
              DominikHoffmann @SteveITS
              last edited by

              @steveits: My guest LAN has a separate interface and a VLAN that is configured in the PoE switch and the UniFi OS console managing my APs.

              1 Reply Last reply Reply Quote 0
              • D
                DominikHoffmann @johnpoz
                last edited by

                @johnpoz: I do not know, how that might have happened.

                1 Reply Last reply Reply Quote 0
                • S
                  SteveITS Galactic Empire @johnpoz
                  last edited by

                  @johnpoz said in Guest LAN client isolation possible?:

                  but blocks rules shouldn't ever have a "state" ;) So that is odd for sure. maybe he adjusted the rule from allow to block? And there were states from when it was allow?

                  Makes sense, with coffee. :) Open states would allow traffic to "bypass" the block rule.

                  @DominikHoffmann is that rule with both the source and destination as GUESTWIFIVLAN Net? That shouldn't make sense either. On a separate interface one would want rules something like:

                  allow from VLAN to "This Firewall" DNS
                  block from VLAN to "This Firewall" (blocks connecting to pfSense 443, etc. on any interface)
                  block from VLAN to LAN Net
                  allow from VLAN to any

                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                  Upvote 👍 helpful posts!

                  1 Reply Last reply Reply Quote 0
                  • O
                    Okijames
                    last edited by

                    Late post but here's hoping for the best...

                    An option not discussed could be considered a hack, but it works surprisingly well.

                    Have the DHCP server hand out a /32 subnet mask to each device. This forces all traffic to the default GW offered by DHCP.

                    See this thread if you don't think it works (I didn't at first).
                    https://www.reddit.com/r/networking/comments/j37xy6/microsegmentation_intravlan_segmentation_dhcp/

                    There's even a security startup based on this concept called Airgap (airgap.io).

                    Implementing this on pfsense, as it is today would be a hassle at best, but it would be awesome to have it as an option. Thoughts on how to submit a feature request?

                    Preemptive: Thoughts other than "it doesn't work because switches and L2" please. I thought the same thing, then I tried Airgap and it does work, even for IoT devices.

                    D 1 Reply Last reply Reply Quote 1
                    • D
                      DominikHoffmann @Okijames
                      last edited by

                      @Okijames: I like that idea, in principle. Of course, it could be overridden by the device by simply setting its subnet mask to /16 and poking around the other IP addresses in the subnet.

                      If a discussion ensued, I think, I could learn a lot. The whole Layer 1/Layer 2/Layer 3 thing is not entirely intuitive to me, yet.

                      O GertjanG 2 Replies Last reply Reply Quote 0
                      • O
                        Okijames @DominikHoffmann
                        last edited by Okijames

                        @DominikHoffmann Not really because devices with a /32 mask won't accept L3 traffic from anything outside of their single IP "subnet", with the odd exception of the GW address. At most, your /16 device can send broadcast and multicast at L2.

                        1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @DominikHoffmann
                          last edited by

                          @DominikHoffmann

                          The typical of the mill DD-WRT device has this option :

                          b6979722-7de1-463a-bce2-11232c8a43b3-image.png

                          which is just perfect for 'public' networks : all connected devices - to this AP - can only talk to the gateway.
                          Be warned : things get trickier when you have more the one AP in the network. My AP's support ebtables - some sort of iptables like firewall, but for mac addresses.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.