91
General Discussion / Re: LAN with client isolation
« on: June 20, 2021, 08:47:01 pm »
Your best option is to use switches that supports port isolation (or client isolation if you use access points).
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
You're right - PEBKAC;)
In the end I got it working and I learned a lot .....
Ever solve this? I am struggling with the LUA file. The http-auth lua uses haproxy-lua-http ... which i can't seem to find.
The solution is to put the script as /usr/local/share/lua/5.3/haproxy-lua-http.lua but then it will not get synced to standby host.
Anyone an idea whart there is going on?
How can i solve this problem with a certificate?
I'm curious on this one. Could a list of MAC addresses be used to force the clients to use the LAN ?. I.e get an ip if in the allowed MAC list only, in case there is no switch with DHCP-snooping.
1. Add static IP Address for all the devices in Services>DHCPv4>[LAN].
2. Add the devices IP Address to Firewall>Aliases.
3. In Firewall>Settiings>Schedules, add the time and day for allow access.
4. In Firewall>Rules>Lan, add the rules to the top. Put allow rule then follow by block rule.
1. You dont need to use virtual IP's.
I totally get your point! This makes indeed sense but I think only if you have a static WAN IP.
As it would break the access from internal networks to the external URLs "service.subdomain.mydomain.tld" if one enabled that access using DNS rewrite rules. I am not aware of a way to rewrite DNS entries in Unbound to the WAN interface address.
With NAT reflection your way of setting this up can of course work.
Just use your gateway IP (192.168.1.1) or whatever it is
