@johnpoz said in Best practices to configure pfsense?:
To be honest for stable working pfsense would be leave it at default, unless you actually need to change something and you understand what your doing...
Agree with that!
Also, to the OP, something you should NEVER do is open port forwards to the "general internet" for servers or services on your internal network(s). Some hacker/cracker will eventually find it and exploit it, guaranteed. If you have internal stuff you want to access from the outside, use a VPN provider/service and remote into your network that way instead.
Also, if you do need/want to create firewall rules to move traffic around your network, it's best to add them 1 at a time and test to make sure stuff works. If it does, you're good. If it doesn't, start looking for answers. Lots of info is on the web and here in the forums.
Jeff