Normally you can go to a URL like http://192.168.0.1/ to access the login page to your router. Sure, I can create a strong long password, but it doesn’t feel secure enough to run untrusted network-connected VMs having access to this page at all. It would be better for only explicit VMs to be able to connect to this IP and port 80/443/22 at all.
Would it be a good idea to explicitly block this IP in all VM’s firewall settings, or is there a better way? Maybe VLAN tags?
Would it be a good idea to explicitly block this IP in all VM’s firewall settings, or is there a better way?
In sys-firewall /rw/config/qubes-firewall-user-script create rules which deny by default, and explicitly allow (whitelist) the IP addresses which you want to access the router’s IP address on a particular TCP port. Try chain custom-forward.
I don’t think your Qubes VM’s are the ones you should fear the most
But yes, you can create firewall rules for all of xour VMs, and filter out whatever you like to - or at least what you can implement with Qubes Firewall.
However imagine, your other devices in your home network:
IP camera(s) or any other IoT devices.
Smart TV(s)
kids/wife/guests phones
Xbox, PS, or any other Windows PC
etc.
Those are all brings much more threat to your LAN, than any of your ‘untrusted’ VM’s - I guess.
So I would suggest a much more device independent approach instead - but that’s surely nothing to do with Qubes OS, but a more general Network Security issue/question