I have a bridge for trunking, bri-trunk. I have added 5 vlans to the bridge to trunk to vmware. This works fine, however, I can access all vlans from all vlans. If that makes sense. How can I block traffic between vlans? Is there a better way to do this?
It make sense if you put vlans to a bridge. Then you bridge the vlans together. Put vlan to the Interface pointing to vmware. Not to a bridge. And tag in vmware.
The router will route (forward) all traffic unless you stop it in the forwarding filters.
You can start with a simple rule in the forwarding chain with action=drop. Then add rules above it with action=“accept” for any traffic that you actually want to forward.
No. You get the same behavior at l3 (routed) but you dont bridge the vlans together (l2)
Eg, when you put vlans to bridge, you will find all the other units’s mac addresses. If you put to a Interface, you will not. ITs also possible to to a lot bad stuf, when put all vlan to one bridge. Then its no reasion to use the vlan’s. Better to just add all ip to the Interface.
Have you tried adding VLANs on the bridge interface, not as bridge port, and bridging physical interfaces? That way you will keep VLAN isolation as you intended and their availability on all physical interfaces you added to the bridge.
Go into /IP Firewall and add a filter in the forwarding chain with nothing selected except Action=Drop.
At that point no traffic will be routed between interfaces at level 3. You may then want to add specific rules above that “drop all” rule with specific traffic that is to be forwarded - e.g. by specifying specific interfaces, IP ranges etc.