Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [SOLVED] Disable inter VLAN traffic

    Scheduled Pinned Locked Moved Routing and Multi WAN
    3 Posts 2 Posters 3.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      Hernan87
      last edited by

      Hi guys,

      I've been using pfsense for a while (2.0.1-RELEASE) and i'm having issues configuring a vlan interface. I 've created a new interface with the vlan id 5 on the lan interface and i've assigned it 192.168.20.1 ip address. The issue is that from a host on vlan 1 (192.168.10.x subnet) i can see a host on vlan5 (192.168.20.x) and vice versa.

      Making a traceroute i can see that packages are routed from pfsense to the other vlan. Does anybody knows how to disable this behaviour? I need traffic from both vlans being isolated for security reasons.

      Thanks in advance!

      1 Reply Last reply Reply Quote 0
      • GruensFroeschliG
        GruensFroeschli
        last edited by

        Create your firewall rules on the VLAN interfaces accordingly.

        If you are using private IPs in your VLANs and want to block traffic between them but allow all to the internet, two rules are sufficient.
        First create an alias containing the RFC1918 subnets: 10/8, 172.16/12 and 192.168/16.

        Create rules:
        1: Allow, Source: OPTx_subnet, Destination: OPTx_interface
        2: Allow, Source: OPTx_subnet, Destination: ! RFC1918_Alias (NOT the alias)

        These two rules:
        Ensure the devices connected to the pfSense can communicate with the pfSense
        Allow accecss anywhere except your local private subnets.

        We do what we must, because we can.

        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

        1 Reply Last reply Reply Quote 0
        • H
          Hernan87
          last edited by

          Thanks! I was able to isolate both vlans adding rules to the firewall.

          1 Reply Last reply Reply Quote 0
          • Cloudless Smart HomeC Cloudless Smart Home referenced this topic on
          • Cloudless Smart HomeC Cloudless Smart Home referenced this topic on
          • Cloudless Smart HomeC Cloudless Smart Home referenced this topic on
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.