Block or isolated device in same network

Started by monkeydelufy, February 24, 2025, 04:16:45 AM

Previous topic - Next topic
hi guys,

newbie here trying to figure it out regarding is that possible if we block in same network for example,
ip 192.168.1.10 cannot reach ip 192.168.1.11 i try to isolated each other is that possible?

Thanks

No, not within a single subnet, where devices communicate without the router noticing.
Deciso DEC697
+crowdsec +wireguard

To expand on that, you would need to force traffic between devices through the firewall. For instance, I use my firewall as the central aggregation point for all of my equipment. I do this for visibility and control. You may have other priorities.

Some managed switches can filter between devices in a single broadcast domain depending on layer 3 and 4 information.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

so there is no solution for this..? all my device connected through opnsese also get ip from opnsese still no clue for this..?

There is no solution for this. All devices connected to a single network can communicate with each other.

To be able to control traffic between two or more devices with a firewall they must be connected to different interfaces of that firewall so the traffic passes through the firewall.

This is how networks work.

As I wrote there are switches that can perform firewall functions across all of their ports. Get one of those.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Or you can check out things like private VLANs or port isolation.

But the IP standard assumes that devices in the same subnet can communicate with each other via layer 2.

Quote from: bimbar on February 25, 2025, 11:08:45 AMOr you can check out things like private VLANs or port isolation.

Which again needs a more than "dumb" switch supporting these features. But valid point, of course.

BTW: @monkeydelufy if it's wireless devices you are thinking of many APs support something called "client isolation". So possibly you would not even need a new device.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Quote from: Patrick M. Hausen on February 25, 2025, 11:13:13 AM
Quote from: bimbar on February 25, 2025, 11:08:45 AMOr you can check out things like private VLANs or port isolation.

Which again needs a more than "dumb" switch supporting these features. But valid point, of course.

BTW: @monkeydelufy if it's wireless devices you are thinking of many APs support something called "client isolation". So possibly you would not even need a new device.

my network right now like this:
2 ether,
1 WAN port
1 LAN port, all device directly connected to ehter2 LAN and this LAN to not connected to switch it connect directly to server which is containing virtualization
my goal just to isolated each VM for protection. huft..

Then create one VLAN per VM ...
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Quote from: Patrick M. Hausen on February 25, 2025, 11:22:38 AMThen create one VLAN per VM ...

create vlan without switch..? still confusing to me need advice

Create VLAN on OPNsense and on the connected host. No switch needed. Now how to do that on the host depends on the product you are using.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Quote from: Patrick M. Hausen on February 25, 2025, 11:35:16 AMCreate VLAN on OPNsense and on the connected host. No switch needed. Now how to do that on the host depends on the product you are using.

ohh i see so i create each vlan for each vm its make sense but more difficult if have a lot vm.
but still not secure enough.

February 25, 2025, 11:57:47 AM #13 Last Edit: February 25, 2025, 12:34:26 PM by Patrick M. Hausen
Quote from: monkeydelufy on February 25, 2025, 11:40:56 AMbut still not secure enough.
Why? VLANs are completely isolated from each other and you can control what is permitted and what isn't with as much granularity as you like. It does not get "more secure" than one network segment per VM.

P.S. You could also use your hypervisor's firewall, probably.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

i will try using vlan then.
btw thanks guys for feedback and advice