Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Any security advantages to OPT port/interface over VLAN Interface ?

    Firewalling
    2
    4
    229
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      CharlesT
      last edited by

      I'm wondering if there is any security advantages in segregating a device on its own built in port/interface over segregating it on its own a VLAN.

      An example: Say I have an AP which allows for 2 SSIDs with VLAN tagging and add each of these VLANs as interfaces in pfSense and create firewall rules isolating each VLAN. Is this less secure in any way than doing the same thing but on the OPT port/ interface.

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @CharlesT
        last edited by

        @CharlesT said in Any security advantages to OPT port/interface over VLAN Interface ?:

        AP which allows for 2 SSIDs with VLAN tagging

        Well in that scenario - how would you connect this AP to the network.. Which AP has discrete ports that can be set for a specific network vs vlans over the 1 port.. You can have one untagged sure.. But your limited to 1 physical port that you want to run multiple networks over - which is vlans.

        The advantage of using physical ports would be better control of data flow, and no hairpin traffic when you had inter vlan/network traffic.

        Unless you physically use different switches your always going to have "vlans" on the switch even if you use native untagged traffic to pfsense, ie the router.

        Unless you were in some shared DC where a customer required different physical infrastructure for their traffic - you normally use just vlans to isolate networks.. I use some different non vlan uplinks from my switch to pfsense for some of my networks - and others I use just vlans over the same physical wire.. But these networks do not have any or much intervlan traffic, and they are wireless networks that wouldn't be saturating the physical interface anyway for bandwidth - so sharing the uplink is fine.. But since I have the ports to spare on my pfsense and my switch I do use non vlan uplinks into pfsense from the switch for some of my vlans on the switch - again mostly for removing any possibility of hairpinned traffic flow.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        C 1 Reply Last reply Reply Quote 0
        • C
          CharlesT @johnpoz
          last edited by

          @johnpoz So as far as setting up firewall rules, there is no difference in security between VLAN Interfaces and physical port-based interfaces, is what I am hearing (reading) you say ? correct?

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @CharlesT
            last edited by

            @CharlesT there is no difference..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 1
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.