• Firewall: Rules direction

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    Cry HavokC
    Correct.
  • Rules that allowing LAN and OPT1 can access eachother

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    M
    Yeah your rules are messy. You have to remember the first rule on each interface that gets a hit will, be ran and everything after that will be ignored. In your lan rules you have any protocol on the Lan subnet can go anywhere with any protocol so all the other rules on that interface are pointless. The same for OPT1. If you get rid of the rest you should be good. Make sure the rest of the computers don't have a personal firewalls blocking ICMP packets. Good Luck.
  • Strange Firewall block logs, pfsense blocks traffic from LAN interface

    Locked
    9
    0 Votes
    9 Posts
    13k Views
    M
    We are having the same problem. Its very annoying. We have a 100/100 conenction and this update added much needed cpu speed but with this problem we are thinking of downgrading pack to 1.2
  • Public IP's behind pfSense

    Locked
    4
    0 Votes
    4 Posts
    4k Views
    GruensFroeschliG
    Well "LAN" is just a name for an interface. Just assing the LAN one of the VLANs and the other VLAN to the OPT1. Like this you dont have a private subnet at all since you dont need it. Yes for managing it a VPN solution would be good. However i'd rather go with OpenVPN than with PPTP. (I'm just a fan of OpenVPN ;) )
  • Routing and Bridging

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    GruensFroeschliG
    Please use the search function: http://forum.pfsense.org/index.php?action=search ( http://forum.pfsense.org/index.php/topic,5727.msg34562.html#msg34562 )
  • Nextalarm

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Download Limit

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    R
    I just wanted to tell you that IPCop is able to do multi-wan. My brother uses IPCop and has 3 WAN connections.
  • Multiple IP's on Single WAN

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    GruensFroeschliG
    If you get 5 IPs you most probably will get a /29 subnet. To use these additional IPs i would add them as CARP type VIPs (firewall –> Virtual IPs)
  • Bridging with load-balancing

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Firewall performance : strange spikes

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    C
    @tekzone: So you think this is due to the internet line and not the firewall itself ? Almost certainly yes.  Trying what I suggested will help confirm that.
  • Firewall permission problems for internet access

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    C
    Adding a rule allowing traffic to the WAN address does just that - allows traffic to your WAN IP. You need to change the destination to "any", or not your internal network, or block your other internal subnets before allowing Internet traffic.
  • SSH from WAN static ip

    Locked
    9
    0 Votes
    9 Posts
    4k Views
    T
    Oh, this my fault. thank you very much, until the next question from me to use this pfsense.
  • Unbridgeing WLAN - LAN

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    E
    i basically have the WLAN interface bridged to the LAN 10.10.1.1 and then that goes out to the WAN 10.10.0.2 (gateway 10.10.0.1) so now i want the WAN interface to stay as it is, the LAN stays with 10.10.1.1 but then i want to remove the bridge and set the WLAN to be 10.10.2.1 and then LAN and WLAN should exit through the WAN interface (but still be able to access eachother) on all interfaces i have the rule ANY -> ANY set as long as i have the WLAN in bridged mode with the LAN interface the firewall rules seem to pull - eg. when i set a restriction to a certain host as soon as i change into the explained goal scenario it seems as the rules just get ignored
  • Only allowing windows traffice between 2 lans…

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    ?
    allow this ports between the two networks 137,138,139 maby 445 also all tcp but it stil wont work with broadcasts so you have to go with ip address. /F
  • Killed my firewall from accessing FTP

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    S
    Think I have a similar problem. As far as I know I can tell you that the rules are not the origin but the ftp preprocessor. http://snort.org/docs/snort_htmanuals/htmanual_283/node101.html .
  • Is any one looking for a firewall with the following specs.

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Newby question how to deal with multiple IP's

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    N
    Thanks, means I was close enough thinking about it!
  • VLANs, Routing, and Network Setup

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    jahonixJ
    Your plan seems to make sense to me. Just remember to NOT use the interface holding the VLANs for anything other than that, e.g. don't assign it an IP/subnet itself. I would move the routing between subnets to pfSense and not let the Cisco do it. But that's related to the fact that I know how to do it within pfSense and wouldn't know about the Cisco. And I have all traffic control in one place. On the negative side I have additional traffic on the NIC holding the VLANs which in your setup is handled by the Cisco.
  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • Egress filtering vs non

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    T
    I completely agree.  I see a tremendous amount of outbound traffic blocked, mostly spawned source ports.  I only have maybe 40 ports for outbound, it isn't too bad.  Thanks for the reply, something I've always wondered about and the only time I open up the LAN is when using greedy apps like Skype.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.