F5F Stay Refreshed Power Users Networks PFSENSE Rules

PFSENSE Rules

PFSENSE Rules

Pages (2): Previous 1 2
M
milk96
Junior Member
49
11-09-2025, 04:49 AM
#11
However, connecting LAN requires being physically near a LAN port, while WiFi allows you to be outside the building. My main goal was to gather more feedback from the person about why they chose this approach to determine if it was truly necessary or just what they wanted, not to imply that blocking is impossible with the right tools. Perhaps I should have been clearer.
M
milk96
11-09-2025, 04:49 AM #11

However, connecting LAN requires being physically near a LAN port, while WiFi allows you to be outside the building. My main goal was to gather more feedback from the person about why they chose this approach to determine if it was truly necessary or just what they wanted, not to imply that blocking is impossible with the right tools. Perhaps I should have been clearer.

B
bbravery
Junior Member
49
11-09-2025, 04:49 AM
#12
In a business environment, users can manage their WiFi completely independently, even when using public networks without needing passwords or login pages. The network will be divided from the main system, with strict limits on data flowing in and out of the gateway. Each access point will enforce isolation so devices can't communicate within the same WiFi group. Network managers decide what functions are available on the equipment, and leaving an open WiFi connection on the same segment as a LAN is considered risky. High-end enterprise gear offers extensive control but comes at a higher price.
B
bbravery
11-09-2025, 04:49 AM #12

In a business environment, users can manage their WiFi completely independently, even when using public networks without needing passwords or login pages. The network will be divided from the main system, with strict limits on data flowing in and out of the gateway. Each access point will enforce isolation so devices can't communicate within the same WiFi group. Network managers decide what functions are available on the equipment, and leaving an open WiFi connection on the same segment as a LAN is considered risky. High-end enterprise gear offers extensive control but comes at a higher price.

M
MrBukkit
Member
215
11-09-2025, 04:49 AM
#13
I understand your point about how the wording influenced my reply. Essentially, I’d focus on safeguarding the other LAN segments. Regarding Wi-Fi, it’s wise to be cautious—don’t rely solely on WPA2. Enhanced methods like EAP/LEAP would add better protection. Physical security remains a significant concern, often overlooked. Dropping a network isn’t secure by any stretch, especially when people bypass access controls. Open networks in main VLANs without NAC or port security are risky. I’ve witnessed bad behavior, such as badge scanning and unauthorized entry despite warnings.
M
MrBukkit
11-09-2025, 04:49 AM #13

I understand your point about how the wording influenced my reply. Essentially, I’d focus on safeguarding the other LAN segments. Regarding Wi-Fi, it’s wise to be cautious—don’t rely solely on WPA2. Enhanced methods like EAP/LEAP would add better protection. Physical security remains a significant concern, often overlooked. Dropping a network isn’t secure by any stretch, especially when people bypass access controls. Open networks in main VLANs without NAC or port security are risky. I’ve witnessed bad behavior, such as badge scanning and unauthorized entry despite warnings.

S
Sertero28
Senior Member
589
11-09-2025, 04:49 AM
#14
It’s understandable, but focusing on client safety isn’t always the best approach in a business setting.
S
Sertero28
11-09-2025, 04:49 AM #14

It’s understandable, but focusing on client safety isn’t always the best approach in a business setting.

Pages (2): Previous 1 2