• Help with newbie and firewall

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    Z
    Yes, I had a block all to try and stop it working, but it still worked. How would I be circumventing controls by pfsense? There is no bridging of interfaces.  WS3 uses pfsense as the gateway so it can get to WS1 (and WAN for the test)  It is a static IP only. It would appear that once a connection was made, and further connections were allowed, even if the firewall was changed to prevent it. I have made some progress but still need clarification. Where do I put the rules to control the flow of data between opt1 and lan?
  • 0 Votes
    8 Posts
    5k Views
    C
    It's been solved. LAN host only allow ping locally. OPT2 can ping remotely. That is why I can only ping from LAN to OPT2, not from OPT2 to LAN. Solution: NAT => Outbound => Manual, add a new rule: Ineerface: LAN Source: OPT2 Destination: LAN NAT address: Interface address Then it's working. Thanks all of you for kind suggestions.
  • Hide router ???

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    T
    @Bern: Why? What's the point? netstat -nr or ipconfig /all at a client would show the presence of the router. Even if you had it proxy arp'ing, it'd still be easy enough to find using "arp -a". I'm sorry, maybe because my english is very bad. i need like this: C:\Documents and Settings\white>tracert www.yahoo.com Tracing route to www-real.wa1.b.yahoo.com [209.131.36.158] over a maximum of 30 hops: 1    1 ms    1 ms    1 ms  192.168.11.1   2    *    *    *                *                            <–-- like this (hide the router)   3        *    *    *                  *   4  242 ms  232 ms  252 ms  203.208.190.45   5    36 ms    39 ms    50 ms  ae0-100.sngtp-dr1.ix.singtel.com [203.208.183.19 4]   6    30 ms    29 ms    28 ms  xe-1-0-0-0.sngtp-cr1.ix.singtel.com [203.208.183 .61]   7  216 ms  218 ms  215 ms  so-3-0-0-0.plapx-cr2.ix.singtel.com [203.208.172 .54]   8  216 ms  220 ms  217 ms  ge-6-0-0-0.plapx-dr2.ix.singtel.com [203.208.183 .166]   9  467 ms  ^C at number 2, the router is hide when the client want to trace to internet. regards
  • Default rule driving me insane

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    H
    Just noticed the static route filtering option, after checking it everything started working fine.
  • MOVED: help me with squid guard

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Make an wifi network (opt adapter)

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    T
    Thank you. Got it working.
  • State table optimization times

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • LAN file sharing

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    E
    Exactly. The above rule would do nothing apart from keeping it out of your logs. Every single host connected to your LAN segment is receiving these packet and your firewall can not filter them even theoretically.
  • Routing / Firewall Issues between LAN and OPT1

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    F
    What are the subnets for your LAN and OPT1? Do you have any other services like VPN?
  • Lear too toot your own horn!!!

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    jimpJ
    And it seems that it's known to the Vayatta folks as well. It doesn't do it now, but for a while if you did a Google search for "pfSense", many of the ads were for Vayatta.
  • Outbound FTP Problems

    Locked
    19
    0 Votes
    19 Posts
    14k Views
    E
    can you give us pfctl -sr | grep ftp
  • Snort Rules updating forever…and ever..and ever...

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Remote desktop

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    K
    I have to agree with most of Bern's assessment, except that I think he gives PPTP too much credit security wise. PPTP encryption uses RC4 as well, which has some known weaknesses. It also exposes a lot of information in the unencrypted side channel which makes it even less secure. See this article for some more in-depth analysis of a couple other potential issues. With all of these potential attack vectors it might be worth using for the ease of use factor, but IMO the security concerns merit serious consideration. Personally I'd never use it for anything, and I'm not much of a security nazi. As far as IPsec is concerned, I agree that it can be a bit tricky to set up a working roadwarrior configuration with PKI, but the ShrewSoft VPN client is pretty straight forward and much easier to get working than MS's built-in client (which has never worked for me - I think it relies on L2TP). Once you get the server side configured properly and learn how to administer the PKI it's really not difficult to get going - but it's still not really something you can just hand to a lay person and expect them to be able to use. With NAT-T in 1.2.3 I'm now using IPsec exclusively whenever I don't need Layer 2 tunneling (where I use OpenVPN). OpenVPN is easier to package in a user-friendly way though if you don't have control of the client PCs as well.
  • VLAN problem

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    K
    @thonik: Rules are OK. Please post them.
  • Emerging Threats Firewall Rules

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    G
    this would be an excellent feature to have it automatically update and block a list of ip addresses
  • Adding 'table' with a persist and file

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    dotdashD
    Your options, listed in increasing chance of success would be: Submit a feature request. (I think you would still use http://cvstrac.pfsense.org/tktnew ) Start a bounty. http://forum.pfsense.org/index.php/board,34.0.html 3)  D.I.Y. http://devwiki.pfsense.org/SubmittingPatches
  • Pfsense Firewall rules system file

    Locked
    2
    0 Votes
    2 Posts
    6k Views
    jimpJ
    The rules are generated dynamically, but a temporary copy is stored in /tmp/rules.debug You can edit this file, but it can and will be overwritten by the system, so it is not safe to make changes there.
  • Bridge mode firewall IPS between ISP and our level 3 switch?

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • FTP via NAT reflection on a Virtual IP

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    GruensFroeschliG
    I'm not sure this is possible. A work around is to set up split DNS: http://forum.pfsense.org/index.php/topic,9440.0.html
  • Bridge Opt1 with LAN - FireWall Rules

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    GruensFroeschliG
    iamthed: Seths question reformulated is: If i have LAN and OPT1. Then bridge OPT1 with LAN. Do i need to duplicate the rules on the LAN on the OPT1 interface to have on the OPT1 interface the same outbound (to the internet) behaviour than on the LAN interface. This has nothing to do with QoS… This is not about allowing onedirection traffic. The answer is: Yes you need the same rules on the OPT1 interface as on the LAN. I think with clever alias usage the number of rules in place can be minimized and thus lower the administration effort.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.