Hi. I know I should probably be able to find the answer somewhere in this thread - but searching on IOT is not allowed, and after reading a few hundred posts I decided to give up
I'm trying to setup a guest network for my IOT sensors, and want to ban them from accessing the internet.
I did a factory reset of my AC87U running latest firmware, installed AMTM (no 385 firmware available for that device yet), Diversion, Skynet and YazFi.
The IOT network i using 10.0.3.0 as subnet, so I added the complete IP range to Skynet IOT banned devices 10.0.3.2-10.0.3.254.
After rebooting and connecting a smartphone and a couple of sensors to the new guest network the list of blocked IOT devices look like this. Most Unblocked devices are removed from the list.(the Unknown devices are a couple of ESP8266's with static IP's):
Code:
--------------- | ------------ | --------------- | ----------
| Device Name | | | Local IP | | | MAC Address | | | Status |
--------------- | ------------ | --------------- | ----------
ESP-Kontor-0 | 10.0.0.245 | dc:4f:xx:xx:xx:xx | Unblocked
Unknown | 10.0.3.11 | 2c:3a:xx:xx:xx:xx | Blocked
Unknown | 10.0.3.13 | dc:4f:xx:xx:xx:xx | Blocked
KA_OP5T | 10.0.3.154 | 94:65:xx:xx:xx:xx | Blocked
IPtables look like this:
Code:
Chain INPUT (policy ACCEPT)
target prot opt source destination
YazFiINPUT all -- anywhere anywhere
logdrop icmp -- anywhere anywhere icmp echo-request
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
logdrop all -- anywhere anywhere state INVALID
PTCSRVWAN all -- anywhere anywhere
PTCSRVLAN all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state NEW
ACCEPT all -- anywhere anywhere state NEW
OVPN all -- anywhere anywhere state NEW
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
INPUT_ICMP icmp -- anywhere anywhere
logdrop all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere match-set Skynet-IOT src tcp dpt:ntp
ACCEPT udp -- anywhere anywhere match-set Skynet-IOT src udp dpt:ntp
LOG all -- anywhere anywhere match-set Skynet-IOT src LOG level warning tcp-sequence t"
DROP all -- anywhere anywhere match-set Skynet-IOT src
YazFiFORWARD all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
other2wan all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
logdrop all -- anywhere anywhere state INVALID
NSFW all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate DNAT
OVPN all -- anywhere anywhere state NEW
logdrop all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain ACCESS_RESTRICTION (0 references)
target prot opt source destination
Chain DNSFILTER_DOT (0 references)
target prot opt source destination
Chain FUPNP (0 references)
target prot opt source destination
Chain INPUT_ICMP (1 references)
target prot opt source destination
RETURN icmp -- anywhere anywhere icmp echo-request
RETURN icmp -- anywhere anywhere icmp timestamp-request
ACCEPT icmp -- anywhere anywhere
Chain NSFW (1 references)
target prot opt source destination
DROP gre -- anywhere anywhere
DROP tcp -- anywhere anywhere tcp dpt:1723
Chain OVPN (2 references)
target prot opt source destination
Chain PControls (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain PTCSRVLAN (1 references)
target prot opt source destination
Chain PTCSRVWAN (1 references)
target prot opt source destination
Chain SECURITY (0 references)
target prot opt source destination
RETURN tcp -- anywhere anywhere tcpflags: FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5
logdrop tcp -- anywhere anywhere tcpflags: FIN,SYN,RST,ACK/SYN
RETURN tcp -- anywhere anywhere tcpflags: FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5
logdrop tcp -- anywhere anywhere tcpflags: FIN,SYN,RST,ACK/RST
RETURN icmp -- anywhere anywhere icmp echo-request limit: avg 1/sec burst 5
logdrop icmp -- anywhere anywhere icmp echo-request
RETURN all -- anywhere anywhere
Chain YazFiFORWARD (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere
YazFiREJECT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
Chain YazFiINPUT (1 references)
target prot opt source destination
ACCEPT udp -- anywhere anywhere multiport dports bootps,ntp
ACCEPT icmp -- anywhere anywhere
YazFiREJECT all -- anywhere anywhere
ACCEPT udp -- anywhere anywhere multiport dports bootps,ntp
ACCEPT icmp -- anywhere anywhere
YazFiREJECT all -- anywhere anywhere
Chain YazFiREJECT (3 references)
target prot opt source destination
REJECT all -- anywhere anywhere reject-with icmp-port-unreachable
Chain default_block (0 references)
target prot opt source destination
Chain logaccept (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-o"
ACCEPT all -- anywhere anywhere
Chain logdrop (9 references)
target prot opt source destination
DROP all -- anywhere anywhere
Chain other2wan (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
logdrop all -- anywhere anywhere
Now - I guess everything looks as it should - but the smartphone still has full internet access (rebooted and disabled mobile data).
Have I misunderstood something about how IOT blocking works, oram I missing some steps?