As per question, but still allow me to access the IoT devices from my Home Network.
![]() ![]() ![]() |
|
I've made a guest network for my single IOT device (single purchased one, I have others, but I've built them so I'm happy for them to be on my regular network).
It does have internet access, but no access to my network. I have one machine with two nics that can communicate across the two networks and it does the interaction needed with the device (sending MQTT messages). I think what I'll be doing soon is making the IOT network as another subnet and blocking internet + to my lan access, but allow my lan to access the IOT subnet - ie making it one way traffic.
IOT also has it's own SSID. All this is on Ubiquiti USG and APs
Previously known as psycik
Home Assistant: Gigabyte AMD A8 Brix, Home Assistant with Aeotech ZWave Controller, Raspberry PI, Wemos D1 Mini, Zwave, Shelly Humidity and Temperature sensors
Media:Chromecast v2, ATV4 4k, ATV4, HDHomeRun Dual
Server Host Plex Server 3x3TB, 4x4TB using MergerFS, Samsung 850 evo 512 GB SSD, Proxmox Server with 1xW10, 2xUbuntu 22.04 LTS, Backblaze Backups, usenetprime.com fastmail.com Sharesies Trakt.TV Sharesight
Wemo requires the phone be on the same subnet to find it and grab the cloud details off it. Wemos are stupid because they dont have an account, so if you go to someone elses house and are on their wifi and run the wemo app, and they have wemos then there is a good chance that it will remove your ones and populate it with their ones losing you remote access to yours till you get back home and can run the app when on the lan again. It will not populate the list over a VPN back home.
richms:Wemo requires the phone be on the same subnet to find it and grab the cloud details off it. Wemos are stupid because they dont have an account, so if you go to someone elses house and are on their wifi and run the wemo app, and they have wemos then there is a good chance that it will remove your ones and populate it with their ones losing you remote access to yours till you get back home and can run the app when on the lan again. It will not populate the list over a VPN back home.
Previously known as psycik
Home Assistant: Gigabyte AMD A8 Brix, Home Assistant with Aeotech ZWave Controller, Raspberry PI, Wemos D1 Mini, Zwave, Shelly Humidity and Temperature sensors
Media:Chromecast v2, ATV4 4k, ATV4, HDHomeRun Dual
Server Host Plex Server 3x3TB, 4x4TB using MergerFS, Samsung 850 evo 512 GB SSD, Proxmox Server with 1xW10, 2xUbuntu 22.04 LTS, Backblaze Backups, usenetprime.com fastmail.com Sharesies Trakt.TV Sharesight
Thanks for the replies. If I make a separate network with its own VLAN and on its own subnet for my IoT devices on the USG, how can I make it so that my openHAB server (which is on my own personal network) see and interact with my IoT devices? My IoT Wireless Network would be hidden too.
If I want to do something remotely when out, I would most likely VPN into my home network (when I can get it working again...)
Sony
sonyxperiageek:Thanks for the replies. If I make a separate network with its own VLAN and on its own subnet for my IoT devices on the USG, how can I make it so that my openHAB server (which is on my own personal network) see and interact with my IoT devices? My IoT Wireless Network would be hidden too.
If I want to do something remotely when out, I would most likely VPN into my home network (when I can get it working again...)
Previously known as psycik
Home Assistant: Gigabyte AMD A8 Brix, Home Assistant with Aeotech ZWave Controller, Raspberry PI, Wemos D1 Mini, Zwave, Shelly Humidity and Temperature sensors
Media:Chromecast v2, ATV4 4k, ATV4, HDHomeRun Dual
Server Host Plex Server 3x3TB, 4x4TB using MergerFS, Samsung 850 evo 512 GB SSD, Proxmox Server with 1xW10, 2xUbuntu 22.04 LTS, Backblaze Backups, usenetprime.com fastmail.com Sharesies Trakt.TV Sharesight
I originally made a corporate network named IoT, but haven't gotten my head around what firewall rules I should be making etc. to allow my personal network access to the IoT network.
Sony
How do I block the IoT network from accessing the internet in the Firewall tab of UniFi? I don't know what Address to put in to create a group.
Sony
Hi All,
Hoping someone would be willing to expand / assist on this. I want to isolate a couple of wired LAN devices on my network. I want them to have internet access but NO local / LAN Access.
I tried cascading an old Modem / Router (Netgear DGND3700) and gave it a separate subnet (10.114.68.0/24) but both networks could still communicate; Router # 1 LAN was connected to the WAN port on the Netgear... I purchased a Ubiquiti USG thinking this would magically fix my problem, but no. Everything is still accessible from both networks. I am not familiar with creating the firewall rules or ACL's.
I currently have an ASUS DSL-AC68U (VDSL; I do have a order to get UFB installed, but Chorus won't climb the power-pole due to OSH issues and are taking forever to design the underground solution) which doesn't support Port Based VLAN's via. the GUI and the information is pretty scare re: CLI Commands. I have 2 x D-Link Smart switches (DGS-1210-08's) which allow VLAN's and ACL's, but again, I am not sure how-to setup and am not sure if this will block local traffic and still give me Internet access.
I am at a total loss and I don't know what to do now. I could purchase a DrayTek Vigor 2860n which will give me multiple private LAN subnets and isolated VLAN's but I don't really want to spend another $650 +
Thanks in advance!
Brad
Finally found some quality time to look at this and have managed to let my home network see my IoT network, but not the other way around, achieved this using Option 3: https://help.ubnt.com/hc/en-us/articles/115010254227-UniFi-How-to-Disable-InterVLAN-Routing-on-the-UniFi-USG
Sony
I use a Unifi UAP AC Pro and Cisco SG500, so IOT devices are own their own ssid and vlan.
I use ACL's on the SG500 to prevent IOT devices access to my lan and guest vlan's, but allow my lan vlan access to IOT devices. I use the SG500 for layer 3 routing, whereas I was using the EdgeRouter 4 with the vlan's present and using firewall rules to achieve the same but shifted those duties to the SG500.
IOT devices have access to the internet
|
![]() ![]() ![]() |