Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dividing access

    Scheduled Pinned Locked Moved General pfSense Questions
    5 Posts 4 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      broncoBrad
      last edited by

      Simple question, but I wanted peoples opinions. If I want to divide access is it better to use multiple NICs and create multiple networks or use firewall rules to create access rules to divide access?

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Access to what from what?
        Multiple NICs/subnets is almost certainly better though. Trying to divide a set of clients on the same subnet with firewall rules can easily be by-passed.

        Steve

        1 Reply Last reply Reply Quote 0
        • B
          broncoBrad
          last edited by

          What about using VLANs? I'm not very familiar with VLANs which is why I'd go with having more NICs, but would it be easier (or just as easy) to divide access the way separate NICs do but with VLANs?

          I've also seen access points with multiple SSID capabilities, but my thought there is that they are still going through the same NIC on pfSense thus they have to be in the same subnet don't they or can they be divided into subnets somehow, but don't we again get into a situation of it become easily by-passed to gain access to the other subnets/SSIDs??

          Thanks!

          1 Reply Last reply Reply Quote 0
          • W
            wallabybob
            last edited by

            @broncoBrad:

            I've also seen access points with multiple SSID capabilities,

            I these APs assign the different SSIDs to different VLANs then pfSense can have a distinct VLAN interface for each SSID and then firewall rules should control access between the distinct wireless LANs.

            1 Reply Last reply Reply Quote 0
            • L
              Lee Sharp
              last edited by

              To preface this, I have been doing networking a LONG time, and actually know it quite well.

              To answer your question, I need a lot more information about what you are trying to divide, and from how many people.  As an example, Vlan vs discreet nics;  A vlan can be busted out of and you can see all traffic, as well as load on one is (to some extent) load on all.  But you can not do trunk ports on discreet nics…

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.