I have some CCTV cameras and I don't want them to be able to reach my computers on my home network. These are closed firmware chinese cam and I'm afraid they'll be use as trojan.
I set up 2 lan interfaces. One for the cam with 192.168.20.X IPs, and another one for the computers with 192.168.10.X IPs.
Is that secure enough or should I go the vlan way?
If this is the configuration, you have already defined VLANs
from:
ps: security is a process, but in general if you have kept the firewall settings as I have been able to observe you should be quite safe ...
at most you can connect a pc in network cameras (10.0.30.x) and verify that you do not have access to your lan but only traffic to the internet (but from what you have posted it already seems so) at most include in this post your current configuration.
ps: I hope your switches are already management and you have already defined vlans on them
Why did you dig up my old message from three years ago?
It was another network and another openWRT version. Today, the cameras are not yet in function and the switches are not manageable.
At the time, it was hard work for me configuring the vlan. Nowaday openWRT has switched to DSA and I cannot just replicate what I had done some years ago. So I wonder if it is mandatory to do the learning again or if subnet is enough.
how so? switch and cabling by itself why would make the network isolated as OP requested?
one subnet can talk with other subnet with or without using dedicated switches (if they are not air gapped obviously) on a connected physical network if configuration is such.
@aruclim please share your current network and firewall config file. if you really want to isolate the two networks you should make sure they are in different firewall zones without forwarding enabled.
The op will definitely need to have an additional subnet to achieve the goals. The term vlan is often used colloquially to refer to an additional subnet. VLANs probably apply here, but if the op is using a dsa device and only needs a single Ethernet port for this subnet, the dsa syntax doesn’t require explicit vlan configuration methods.
"iot_lan" firewall zone "iot_zone" ip=192.168.20.x/255.255.255.0
and verify that you do not have access to your lan ( 'trusted_lan' )
and verify that you do not have access your "modem/router" (upstream of the Openwrt router)
but only traffic to the internet ...
If you find that you have this problem I suggest you add the following firewall rule (only ipv4 to private networks):
config rule 'iot_reject_private_ip'
option src 'iot_zone'
option name 'Reject forward iot zone to private nets'
option dest '*'
option family 'ipv4'
option target 'REJECT'
list proto 'all'
list dest_ip '192.168.0.0/16'
list dest_ip '172.16.0.0/12'
list dest_ip '10.0.0.0/8'
just to understand what it was for (if I had to read the configuration after a long time):
After adding the rule to prevent to iot_zone to reach private IPs, everything is fine. Machines on the subnet 192.168.20.X are unable to ping anything in the house.
Thanks a lot.