mpack wrote:I'm not sure that prevents Internet access, it only means that it doesn't have a default gateway address. If I was writing malicious code I suspect I could discover the gateway address by other means. I don't think you've actually blocked it.
Possibly, but that assumes the malicious code already resides on the computer or virtual machine. If that were the case, there are many paths for sabotage.
Btw, a network card speaks Ethernet. TCP/IP related stuff is software, so you won't anything about that in the (virtual) hardware options.
So, how would you accomplish your earlier suggestion (to remove the gateway from the NIC's ipv4]?
The only way I can think of for a VM to have access to the LAN but not to the Internet is to blacklist the VM at the Router. The Router would have to have an option to blacklist it on the Internet only, but allow LAN traffic. Also the VM would have to be using an identifiable IP, i.e. bridged, not NAT. Another possibility with a cabled LAN if you assume that all PCs converge at a switch then a PC can always communicate with other PCs via the switch, even if blacklisted at the router.
As stated earlier, a fixed IP would cause more problems than it would solve.

I do like the idea of communicating via the switch instead of the router. I didn't realize that would work.
I'm actually trying to think of a way to achieve the opposite on my home network: give a networked device access to the Internet, but don't allow local network access...
If your router has a "guest network" feature, set up the guest network without LAN access, and connect your wireless TV device to that network. This is what I do with my Roku streaming device, and it works well.
