Hi Derelict
Thanks for replying
Its a very basic setup really, My satelite box vu+ solose has ftp telent etc and would like to have access to ftp, i cant seem away to change port settings.
So a simple setup of pfsense working fine, setup port forwarding and got the ftp working fine too. setup my Pia vpn and both ftp and Pia vpn working.
Tried to add a kill switch using the floating rules my ftp stops dead.
If i follow the https://www.privateinternetaccess.com/forum/discussion/29231/tutorial-setup-pia-on-pfsense-2-4-2
and use https://www.privateinternetaccess.com/forum/uploads/editor/92/w00wmc2lq7yt.png
Then i get no ftp anway
On the bottom of the post i read
Disabling NAT'ing for the WAN is AN ABSOLUTE HORRIBLE IDEA and DOES NOT STOP TRAFFIC ROUTING.
Disabling NAT address translation rules does not stop traffic from being routed out an interface if the VPN is down. It only prevents the IP addressing from being translated when traffic is routed out that interface, which can result in routing RFC1918 addressing onto the WAN.
The only way this blocks traffic is that an upstream router is most likely blocking non-internet routeable RFC1918 addresses, but at that point your traffic has already been leaked onto the WAN interface.
The better solution is to make sure unintended traffic never leaves the WAN by creating pfSense float rules that allow only DNS and OpvenVPN traffic out the WAN and block everything else going out the WAN. Such rules would only have affect when the VPN link is down and the WAN is the default route, to allow DNS lookup of the PIA host, and creating the VPN link, all other outbound traffic out the WAN should be blocked or rejected. Once the VPN link is up and becomes the default route traffic will route unblocked over the VPN link.
Thanks