@hahnice:
Hi
This is my first post but would like to say what a fantastic product pfsense is.
With regards pfblockerNG, I have read a lot of posts describing why you dont need to block the world and only allow certain countries due to the fact that there is a explicit deny on the inbound WAN connection - excepting any configured open ports.
My question revolves around IoT devices like security cameras and Smart TVs that 'call home' on a regular basis. The other worry for me is APPs downloaded from Google Playstore that have the ability to open ports outbound to a unknown destination.
Using Pfsense I found a camera app on my phone that was calling home to mail.ru. This is a worry. Also, my Swan security cameras (hikvision) regularly try to connect to china but are blocked by the country blocker.
I understand that DNSBL stops large amounts of this traffic so if I use DNSBL with regularly updated feeds should i deselect these Countries and let DNSBL stop the traffic?
pfBlockerNG is a great tool if you want to block geographic areas from accessing a viable service since the default WAN block rule wouldn't apply to a port forward. For example, if you have a Terminal or RDS server with a port forwarded for remote access then the service is out there and available for people to connect to and it needs to be secured. In this case you can throw RDPGuard on the server (an inexpensive and great product btw) to protect and lock out IPs with failed logon attempts but it would be a better use of resources to just block the packets altogether at the firewall. That's what pfBlocker would do. Same thing with an FTP server or a web server. Once the rule is in place (unless you specify the source IP) pfBlocker becomes useful. If a needed IP is blocked it can always be whitelisted.