@socrateberserk said in If this is not the right place to post my question, please direct me to the correct one.:
I am unable to properly configure pfSense to allow the use of the SSH protocol
What pfSense does is : routing, and fire-walling : IP packets.
These packets might contain - in the so called payload - fragments of the mail you send or receive, a web server that is sending you a web page you requested, or a DNS answer from a DNS server you've requested zone info.
The SSH protocol is the description of that payload. And because it's SSH, the payload i, for pfSense, a complete random set of bits, and pfSense can't do anything with it, as it is encrypted.
All this boils down to : pfSense doesn't care about the payload. It doesn't use or 'touches' the payload.
Out of the box, when you installed it, pfSense behave like any other firewall router out there : it has a WAN, a LAN, and everything from LAN passes to the WAN.
pfSense itself also contains a SSH 'server' so you can connect to it. By default, its disabled.
I can connect to my web server, a server rented in a data center somewhere in Paris, from a PC connected on pfSense LAN, just fine.
And the other way raound also works : the same server can connect to my Syno NAS on my pfSense LAN also : I opened up the IPv4 port 22 on my WAN with a NAT rule (I've set the source address is the IPv6 of my server. So this is secured.
For IPv6 things are simpler : just a pass firewall rule, IPv6 destination is the IPv6 of my NAS, destination port is '22' and source address is also set == the IPv6 of my server, so also secured.