How to block router login for VLANs?

The default "Guest" network blocks the router login page which it should, and I expected other vlans to as well since they're on different subnets. I've created several vlans and successfully setup rules to block them from the lan and each other etc, but they can still get to the router login. How do I stop that? I don't want my IoT vlan to be able to get to the router login. Thanks!

This question may be caused if the newly created VLAN is classified into the "lan" zone of ​​the firewall.

You can create a new rule in the firewall:

uci add firewall rule
uci set firewall.@rule[-1].name='Block_VLAN11_Web'
uci set firewall.@rule[-1].src='lan'  # change depends on your VLAN zone name
uci set firewall.@rule[-1].src_ip='192.168.11.0/24'
uci set firewall.@rule[-1].dest='device'
uci set firewall.@rule[-1].dest_ip='192.168.11.1 192.168.8.1'
uci set firewall.@rule[-1].dest_port='80,443'
uci set firewall.@rule[-1].proto='tcp'
uci set firewall.@rule[-1].target='DROP'
uci commit firewall
/etc/init.d/firewall restart

Wanted to optimize this :+1:, now the firewall rule points to this device on 0.0.0.0 even if there are more ranges present, they don't have to be listed, only src is required.

uci add firewall rule
uci set firewall.@rule[-1].name='Block_VLAN11_Web'
uci set firewall.@rule[-1].src='lan'  # change depends on your VLAN zone name, if vlan is in zone vlan11, place vlan11 here.
uci set firewall.@rule[-1].dest_port='80 443'
uci set firewall.@rule[-1].target='DROP'
uci commit firewall
/etc/init.d/firewall restart

Thank you!

Thank you that worked perfect.

1 Like