@hidden0 wrote: I understand where you are coming from now, @AnGr. Let me see if I can provide a better answer given that information. The Guest Mode toggle on any wifi network automatically creates layer 3 firewall rules that deny traffic to or from any private network address ranges such as 192.168.128.0/24, or 192.168.129.0/24. I would expect any devices connected to the guest network to be unable to communicate with each other (so long as Guest Mode is enabled). The ability to define layer 3 firewall rules on the GX, now that VLANs can be managed on the hardware, is one of our upcoming feature releases. The approach will redefine our network creation flow, and allow you to Secure or Restrict a VLANs ability to communicate with other networks that are reachable via the GX. Do you see yourself needing to control what VLANs need access to which, or would a blanket "block all LAN access" policy (like Guest mode) do the trick? @hidden0 Creating a Wifi "home" at the default VLAN 1 and toggle a Guest mode on that Wifi will give me a result that is doing what I need for wifi. I can use the guest mode as "work" wifi. Then noone on the home "wifi" should be able to reach the "work" wifi, but that still leaves me with the issue of VLAN segmenting on ethernet. On the second part, a "block all LAN access" policy on port level will do the trick for my on my case, but for a small business aspect, not beeing able to have the ability to set exception rules, in a example, sending logs from one zone to a logserver in another zone while blocking all other traffic would not be good. Is there a estimated time on possible feature release? If I get a GS-110-8P will I then be able to isloate the VLANs and have an ability for exception rules?
... View more