• Firewall Rules Order

    17
    0 Votes
    17 Posts
    1k Views
    S
    @katakuri FWIW the only interface/rules tab with anything on it by default is LAN. The anti-lockout rule there looks like: [image: 1746221033269-446416df-db20-4d13-bf86-df8965cb583e-image.png] There's a checkbox on System>Advanced>Admin Access to remove that. (there are also two default rules there to allow IPv4 and v6 to any)
  • Firewall Rules and the Gateway

    2
    0 Votes
    2 Posts
    324 Views
    V
    @katakuri said in Firewall Rules and the Gateway: But when traffic has to go through the gateway, such as traffic going to the internet, the destination for the traffic will be the actual target, not the gateway itself, right? Traffic destined for outside the subnet is sent to the gateway but for the firewall the actual target is the remote address? Yes. Firewall rules in pfSense work at layer 3. Each IP packet includes the source and the destination address in its header. These are evaluated by pfSense for filtering the traffic. The gateway, however, is a case of layer 2. A packet can be sent to the gateway (per hardware address) even the destination address is something different.
  • 0 Votes
    3 Posts
    404 Views
    T
    @bmeeks got it, thank you
  • WAN address trying to connect to to itself @ ssh 22

    3
    0 Votes
    3 Posts
    337 Views
    S
    @johnpoz You nailed it. ntopng is installed!
  • monitoring pfsense with uptimerobot

    10
    0 Votes
    10 Posts
    1k Views
    S
    @pfsense57352 I am new to pfsense and It might seem a bit overkill to install Home Assistant just to monitor pfsense, but the built in integration is really nice and I don't know your use case. It even has an addon that runs locally called Uptime Kuma (basically an uptimerobot alternative). The ha pfsense addon has a lot of sensors... just fyi here is a home assistant page where I get info from pfsense: [image: 1745655285634-pfsenseha.jpg]
  • State Type not "None" still keeping state

    1
    0 Votes
    1 Posts
    175 Views
    No one has replied
  • 0 Votes
    1 Posts
    203 Views
    No one has replied
  • Make firewall rules based on user.

    3
    0 Votes
    3 Posts
    384 Views
    A
    @Gertjan Thanks, friend. I thought that Pfsense, like Fortigate and Palo Alto, was capable of creating rules based on users, so how can I do this mac and dhcp connection?
  • Filter rules failed to reload on Netgate 24.11 freshly reset

    9
    0 Votes
    9 Posts
    687 Views
    N
    @cosmos-tong thanks but no thanks. idiom. used to say that you are grateful to someone for offering something but that you do not want to accept the offer; sometimes used humorously when you are not really grateful:
  • Firewalling MAC addresses

    64
    2 Votes
    64 Posts
    65k Views
    LaxarusL
    @patient0 Ugh, this is embarrassing /:()
  • Find number of rules in a firewall.

    3
    0 Votes
    3 Posts
    299 Views
    F
    @johnpoz Thank you for your answer. First of all I saw that documentation page. It says "A safe assumption is approximately 1K of memory per entry to be conservative." so I assumed that I could use that number. I love pfsense (I have four Netgate devices), but there are some issues with it, and this is one of them. It would have been nice to have this information in the GUI, or perhaps auto-adjusted limits. Adding 200 000 more to the limit fixed my problem.
  • 0 Votes
    2 Posts
    278 Views
    GertjanG
    @louis2 What rule ? What interface ? What log settings ? edit : [image: 1744891434460-74e1219f-ef00-4b06-b483-bd3abd2613a8-image.png] and things will calm down.
  • Pass rules blocking traffic !!!???

    2
    0 Votes
    2 Posts
    217 Views
    K
    @louis2 https://docs.netgate.com/pfsense/en/latest/firewall/configure.html#ip-options
  • Allow Any Any question regarding guest network

    27
    0 Votes
    27 Posts
    1k Views
    wgstarksW
    @Gertjan Done thanks.
  • Problem with Log Filterlog

    8
    0 Votes
    8 Posts
    578 Views
    jmchenryJ
    I just checked, you are correct. First action on PRI5 is block and second action on Europe is match =)
  • WAN TO LAN

    36
    0 Votes
    36 Posts
    2k Views
    jhmc93J
    @patient0 ok thanks
  • Can’t access pfsense LAN IP from main network

    9
    0 Votes
    9 Posts
    538 Views
    H
    @helis821 forgot to say - also doesn't work with windows firewall disabled
  • Allow only outbound connections to one ext. IP and port

    12
    0 Votes
    12 Posts
    684 Views
    GertjanG
    @CreationGuy said in Allow only outbound connections to one ext. IP and port: edit: although, I do like to see the external attempts on getting into the router... Wrong ... That would be like looking in the barrel of a gun to see if a cartridge (bullet) is loaded. Not the best way of checking things. Every blocked packet will match the default block rule .... that's ok, and can be done rather quickly, but if every blocked packet also needs to be written out in a file - the firewall log, then every blocked packet will use loads of CPU cycles. If 'they' know that you are doing that, they will ramp up the traffic quickly - this is what DOS is, your log file will fill up very quickly, your pfSense will get hot and goto "100 % CPU usage" , and if a log file rotating goes wrong your disk start to fill up => bommmmm assured. Is your disk an emmc (see other forum threads) ? Your disk will be dead in the near future => another boomm. Apply the good old rule : keep a low profile and nobody will knock on your WAN door. After all, your WAN interface is probably constantly probed for possible allowed in-going connections. You can't stop ** that. It's part of the Internet. See it as the back ground noise. It's like living in a huge building with many front doors : kids are constantly pulling your door bell. Up to you to stay alert behind the door to see who is ringing .... Even worse : if you get DOSsed, there is only one thing you can do : call your ISP and make "them" (the dossers) stop. They'll tell you they can't ... but they can pull the plug for you - or you pull the plug yourself = remove the WAN cable for a moment. Or wait it out you doing nothing, pfSense can handle it : black-holing traffic is easy, you are after all limited to the bandwidth you have. Actually, you can : put a firewall in front of your firewall. So, ok to have a look at what happens at the WAN gate ones in a while, just don't forget to stop logging when your done. edit : If your pfSense is behind a (CG)NAT or your ISP router : you won't see anything on WAN, as the upstream firewall / router / NAT device already took the bullet for you.
  • IP Addresses from potentially bad locations (Fast Logging)

    3
    0 Votes
    3 Posts
    210 Views
    GertjanG
    @carrzkiss One solution could be : pfBlockerng. [image: 1744010549841-68f36227-c458-498a-a2fb-fd1422db2c5b-image.png] To use GeoIP, you have to read about GeoIP (see the link and forum posts) and crate an account : [image: 1744010633554-ae07b67c-01b6-4ac4-9834-103663ad6c13-image.png] Also have look at what ASN is, and what it can do for you. Btw : There are not really bad IPs. The whole idea is that your web sites gets visited, and this will happen if something or some one mentions your site somewhere.
  • Googletagmanager google-analytics and gstatic

    url privacy ccpa gdpr
    3
    0 Votes
    3 Posts
    308 Views
    JonathanLeeJ
    I wonder if this is related to the Google analytics. [image: 1743913405117-img_2015.jpeg]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.