PDA

View Full Version : [ubuntu] Isolation on VLAN



Geoff_Lane
February 18th, 2021, 08:12 PM
Just started experimenting with VLAN and understand the basic principles.

On my router I have an option when setting a VLAN to isolate; why would someone choose to create a vlan and then not isolate?

Seems to defeat the object unless I am missing some other useful function although I do appreciate it would effectively give you 506 addresses on one network if not isolated.

Geoff

kevdog
February 19th, 2021, 02:44 PM
VLAN provides isolation but intercommunication between VLANs requires routing. At the router level there is typically a firewall that can control communication (one way/two way/various ports) between VLANs. Sometimes services like uPnP don't work very well between vlans or anything that requires automatic discovery. Oftentimes you don't want to isolate when testing various firewall rules.

Geoff_Lane
March 15th, 2021, 06:46 PM
VLAN provides isolation but intercommunication between VLANs requires routing. At the router level there is typically a firewall that can control communication (one way/two way/various ports) between VLANs. Sometimes services like uPnP don't work very well between vlans or anything that requires automatic discovery. Oftentimes you don't want to isolate when testing various firewall rules.

Sorry for delayed response, missed notification.

On my router, a TP-Link TD-W9970 there doesn't seem an option to alter isolation once created, you either have it or not. Easy enough to delete and recreate.

My router firewall seems to be able to only control traffic between WAN and LAN, does not appear to be able to control traffic within LAN unless I am missing something blatantly obvious.

Geoff

kevdog
March 17th, 2021, 12:39 PM
@Geoff_Lane

I've only really worked with interVLAN routing with pfSense router software. On pfSense you define your VLANs and then use a firewall to control communication or isolation between them. I'm not sure of other router software since I've never used other software. Some VLANs like guest -- I totally isolate. Other VLANs like ioT - I need to allow for UPnP and MDS. It just depends. If you can not control communication between VLANs than perhaps you are going to have to design your network a little bit differently.

Geoff_Lane
March 19th, 2021, 11:55 PM
VLAN provides isolation but intercommunication between VLANs requires routing. At the router level there is typically a firewall that can control communication (one way/two way/various ports) between VLANs. Sometimes services like uPnP don't work very well between vlans or anything that requires automatic discovery. Oftentimes you don't want to isolate when testing various firewall rules.

Thank you for reply.

Created the vlan via my router and the firewall only seems capable of LAN > WAN or visa versa but not LAN > LAN

Geoff

DuckHook
March 20th, 2021, 05:59 PM
I'm lousy with most things network, but the usual method to route/firewall traffic on the interlan side is through arcane iptables rules. There are no easy GUI controls, even on DD-WRT or OpenWRT. Does your router http interface allow the option of manual commands? If not, can you ssh or telnet into it? Yes, some commercial routers are so poorly secured that they allow telnet. Really. At any rate, if you can get into it in any fashion, you should be able to manually set up iptable rules. Care is needed. You can lock yourself out or, worst case, soft brick your router, though recovery is not usually a problem.

I end up using iptable rules that I find through websearching and kinda‑sorta understand, but not really. It isn't the most secure way to go about things, as I am in knows‑just‑enough‑to‑be‑dangerous territory.

Geoff_Lane
April 24th, 2021, 10:03 AM
I'm lousy with most things network, but the usual method to route/firewall traffic on the interlan side is through arcane iptables rules. There are no easy GUI controls, even on DD-WRT or OpenWRT. Does your router http interface allow the option of manual commands? If not, can you ssh or telnet into it? Yes, some commercial routers are so poorly secured that they allow telnet. Really. At any rate, if you can get into it in any fashion, you should be able to manually set up iptable rules. Care is needed. You can lock yourself out or, worst case, soft brick your router, though recovery is not usually a problem.

I end up using iptable rules that I find through websearching and kinda‑sorta understand, but not really. It isn't the most secure way to go about things, as I am in knows‑just‑enough‑to‑be‑dangerous territory.

Currently experimenting with open-wrt on a Raspeberry-Pi, works OK but probably not practical.

Geoff