Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can you block LAN to LAN traffic?

    Scheduled Pinned Locked Moved Firewalling
    11 Posts 7 Posters 10.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eprimaveri
      last edited by

      I was wondering is it possible to block lets say 10.1.1.1 from accessing 10.1.1.2 through PFSense 2.0?  I would like to limit only allowed port traffic that is needed.

      1 Reply Last reply Reply Quote 0
      • P
        podilarius
        last edited by

        That is not possible LAN to LAN traffic will never get to the firewall.

        1 Reply Last reply Reply Quote 0
        • RonpfSR
          RonpfS
          last edited by

          If you bridge multiple interfaces, you can put the 'bad' guys on one interface and then create Firewall rules in pfsense

          2.4.5-RELEASE-p1 (amd64)
          Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
          Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

          1 Reply Last reply Reply Quote 0
          • E
            eprimaveri
            last edited by

            @podilarius:

            That is not possible LAN to LAN traffic will never get to the firewall.

            Thats what I thought.  Thanks for the reply.

            1 Reply Last reply Reply Quote 0
            • P
              podilarius
              last edited by

              @RonpfS:

              If you bridge multiple interfaces, you can put the 'bad' guys on one interface and then create Firewall rules in pfsense

              Only if you know the "bad" ones and if the become good you have to move them. So you constintently are having to move cables around. Not to feasible.  It is possible to do this though.

              1 Reply Last reply Reply Quote 0
              • R
                RobinGill
                last edited by

                You could probably put a 255.255.255.255 subnet mask on the pc that should not be able to access other pc's on the network, but this will not let the pc even see any broadcasts on your network and won't be able to access any servers on the lan.

                Problem is you will probably still need to manually set this mask on each pc to be isolated, and try it on one machine before doing it to users.

                Also this will mean any queries for the lan are sent from the pc to your router - haven't tried this, so I'm not certain if the router would just forward everything to the relevant pcs on the lan.

                1 Reply Last reply Reply Quote 0
                • J
                  joako
                  last edited by

                  @podilarius:

                  @RonpfS:

                  If you bridge multiple interfaces, you can put the 'bad' guys on one interface and then create Firewall rules in pfsense

                  Only if you know the "bad" ones and if the become good you have to move them. So you constintently are having to move cables around. Not to feasible.  It is possible to do this though.

                  With a VLAN you just change the switch configuration. Create 2 VLAN for a basic "protected" and "access" networks, or go as far as putting each port on its own VLAN.

                  1 Reply Last reply Reply Quote 0
                  • P
                    podilarius
                    last edited by

                    You could even go so far as using the builtin firewall that comes standard on most modern OSes to block everything except outbound traffic. If you are using Windows in a domain, you can even set a domain group policy to block all incoming traffic and allow only outbound.

                    So many options!

                    1 Reply Last reply Reply Quote 0
                    • E
                      eprimaveri
                      last edited by

                      Thanks everyone!  Yes I didn't think you could actually block LAN traffic unless using the OS firewall.  However we are going through PCI Compliance and this is one of the questions that came up.

                      1 Reply Last reply Reply Quote 0
                      • S
                        ScottyBones
                        last edited by

                        It is possible to attain this type of blocking, just not at the (layer 3) router/firewall level.  It is accomplished in (layer 2) switches or AP's at the access layer. In AP's it is typically called client isolation, where as in switches it will typically be called port isolation.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          Yeah you can do what your wanting at the switch level.  Just need a managed or smart switch that provides that functionality.

                          Now you can filter using traffic between different lans using pfsense, if your pfsense handles the routing between the multiple lan segments.  Or I do believe even if the pfsense bridges the 2 different physical networks, even if they are using the same ip ranges.  but you would not be able to block traffic between devices on the same physical network.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.