awesome thanks! I didn't realize you could specify a != that simplifies 
a bunch of other filters I have setup before.

On 11/15/2010 04:06 PM, Butch Evans wrote:
> On Mon, 2010-11-15 at 14:46 -0800, Matt Jenkins wrote:
>    
>> I have 6 virtual wlan interfaces. I want to prevent traffic form any
>> wlan interface to reach any other wlan interface. This includes the IP
>> address of the wlan interface. Besides creating 42 (I think) filters to
>> do this is there any way to group interfaces into a filter template or
>> something?
>>
>> WLAN1 - 10.66.1.1/24
>> WLAN2 - 10.66.2.1/24
>> etc....
>>
>> All are NATed to a different public IP on eth1.
>>      
> assuming your "public" interface is ether1, you can do:
>
> /ip firewall filter
> add chain=forward in-interface=!ether1 out-interface=ether1 \
>      comment="permit traffic leaving on ether1" action=accept
> add chain=forward in-interface=!ether1 action=drop \
>      comment="don't allow traffic from wlans to talk to each other"
>
>
> Again, this is not a complete firewall application, but it will do
> exactly what you want.  You could do the above in one rule as:
>
> add chain=forward in-interface=!ether1 out-interface=!ether1 action=drop
>
> FWIW, this is one of the things we cover in GREAT detail in my training
> classes.  Firewall/filter is one of the things we spend a LOT of time
> covering.  I dedicate a full day to this topic.  Hit me offlist for more
> information on the training opportunities coming up, or see my website
> below.
>
>    


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to