Segregating VLAN Groups?

Comments

2 comments

  • Avatar
    Firewalla

    1. If you create the LAN (VLAN) using lockdown network mode, everything should be locked down, including WAN.

    2. If you create the LAN (VLAN) using a Local network, you just create a network. Here, you can add rules to block traffic from other VLANs. You can find more examples on rules here https://help.firewalla.com/hc/en-us/articles/4408644783123-Network-Segmentation

    0
    Comment actions Permalink
  • Avatar
    Travis

    After reading the article again the only specific rule I could find is under the "Single Ethernet Device" section. For my example this results in:

    Action: Block, Matching: Traffic from & to All Local Networks, On: Network VLAN1
    Action: Block, Matching: Traffic from & to All Local Networks, On: Network VLAN2
    Action: Block, Matching: Traffic from & to All Local Networks, On: Network VLAN3
    Action: Block, Matching: Traffic from & to All Local Networks, On: Network VLAN4
    Action: Block, Matching: Traffic from & to All Local Networks, On: Network VLAN5

    However, this seems to block communication between devices in the same VLAN. I had to also add the rules:

    Action: Allow, Matching: Traffic from & to VLAN1, On: Network VLAN1
    Action: Allow, Matching: Traffic from & to VLAN2, On: Network VLAN2
    Action: Allow, Matching: Traffic from & to VLAN3, On: Network VLAN3
    Action: Allow, Matching: Traffic from & to VLAN4, On: Network VLAN4
    Action: Allow, Matching: Traffic from & to VLAN5, On: Network VLAN5

    Is this the correct implementation? I've done some simple tests and it seems to be working as expected. I would prefer fewer rules if possible, but it is easier to read them now at least.

    I'm not sure if it would be cleaner to start with a lockdown network and build out from there for my use case: groups of devices that can communicate within their VLAN and to the internet, but not to other VLANs.

    0
    Comment actions Permalink

Please sign in to leave a comment.