• Help with GeoIP aliases needed

    3
    0 Votes
    3 Posts
    538 Views
    cfapressC
    AH ... yes, indeed my subnetting skills were lacking here. I resorted to lookups with this tool which helped me better understand what my brain couldn't sort out itself: http://jodies.de/ipcalc?host=216.220.128.0&mask1=17&mask2= Your link to the maxmind database is very helpful. So, thank you for that. Much appreciated. It will come in handy in the future. Thanks for the prompt response.
  • Looks lke its " working ...

    25
    0 Votes
    25 Posts
    2k Views
    V
    @Gertjan said in Looks lke its " working ...: The webserver being used by pfBlockerNG is listening to : If i leave it @ 127.0.0.1, my when i try to acces a blocked domain the browser keeps spining. ANd nothing getting logged in DNSBL sockstat -4l | grep 'lighttpd_p' root lighttpd_p 85774 4 tcp4 *:8081 : root lighttpd_p 85774 5 tcp4 *:8443 : root lighttpd_p 85774 6 tcp4 10.10.10.1:443 :
  • Cannot Lock/Unlock - IP or table missing

    1
    0 Votes
    1 Posts
    271 Views
    No one has replied
  • Squid /ClamAV problem

    2
    0 Votes
    2 Posts
    402 Views
    M
    Sorry, wrong subcategory - I'll post it again.
  • 0 Votes
    1 Posts
    206 Views
    No one has replied
  • pfBlockerNG and DNS

    3
    0 Votes
    3 Posts
    733 Views
    T
    Hello, ok, I disable the DNS forwarder and activate the DNS Resolver. For use the Unbound DNS Resolver I add a NAT redirect rule from here: Netgate Docs redirecting-all-dns-requests-to-pfsense My question, the NAT redirect rule create a LAN rule too, this rule is automatic below the pfblockerNG IP rules, must I move it above, after the Anti-Lockout Rule? Do I need the Blocking DNS Queries to External Resolvers rule too? regards ThomasD
  • pfBlockerNG-devel DNSBL Cert Error

    2
    0 Votes
    2 Posts
    3k Views
    BBcan177B
    See: https://www.reddit.com/r/pfBlockerNG/comments/ao98u1/dnsbl_certificate_error/ and: https://www.reddit.com/r/pfBlockerNG/search/?q=certificate&restrict_sr=1
  • .mil, .gov and banks domains lists

    1
    0 Votes
    1 Posts
    191 Views
    No one has replied
  • STUN, public email providers and some feeds from SecOps

    1
    0 Votes
    1 Posts
    260 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    11 Views
    No one has replied
  • Captive portal taking up to a minute to appear

    6
    0 Votes
    6 Posts
    737 Views
    GertjanG
    @bhjitsense said in Captive portal taking up to a minute to appear: Okay.... so what are you saying? I can't use forwarding? I'm not saying anything ^^ [image: 1572334305967-b182a6e4-21ad-4174-a438-5705b20286e0-image.png] I think that that text says : use Unbound in resolver mode .... but I might be wrong. DNSBL works fine for me. Btw : by default, unbound, the resolver uses the 'core' Internet DNS facilities and this should work as soon as you start pfSense for the first time and activate a WAN connection. If that doesn't work for you, your connection is not good. I'm not saying you can't use the Forward mode, but I suggest that you test with a (non modified) basic setup. When it works, you change things step by step. As soon as things stop to work, you will know what to undo .
  • 0 Votes
    3 Posts
    479 Views
    T
    Can't tell anymore. I completely removed pfBlockerNG. I'll start from scratch when I find time. Thank you.
  • PfBloquer, help with entry locks

    Moved
    2
    0 Votes
    2 Posts
    213 Views
    johnpozJ
    Moved your question to the pfblocker section.. Not sure why this should be a question though... You create an alias, then use it in your rules to either allow or block access to the ports you have open.. Its not something you need a guide for, its just a basic firewall rule.. Block or Allow. I have plex allowed in my rules. I have a list setup that contains US, and Honduras, it also contains known IPs used by plex to test if server is available remotely.. And also included is IPs that test from 3rd party if the port is open - so I can get notified if not available. These are the only IPs that are allowed to use the rule, they are the source. Above that rule I have a different list (bad actors) because they might be from the US, or Honduras.. So blocked them before they can get to the allow list. Remember rules are evaluated top down, first rule to trigger wins.. No other rules are evaluated.. So if create a rule that top that blocks who you want to block, then they would never get to your allowed rules.. You limit your allow rules with a source limit to only allow say US, even though they are not on a specific bad list.. They are not US so they are not allowed. So they will drop through to the default deny.
  • pfblockerng not working for all ip's in the aliases

    3
    0 Votes
    3 Posts
    484 Views
    S
    @rtkluttz said in pfblockerng not working for all ip's in the aliases: 45.82.152.0/23 What about pfB_Europe_v4? Do you have anything in there in your WAN Rules?
  • Whitelisting instead of Blacklisting

    1
    0 Votes
    1 Posts
    334 Views
    No one has replied
  • Dnsbl listening port

    2
    0 Votes
    2 Posts
    429 Views
    GertjanG
    Hi, No way. Just keep the default ports (8081 and 8083). Same thing for the Virtual IP default 10.10.10. - except if this IP falls into one of your LAN's or other networks. Removing the '53' from unbound and be ready to 'break everything' ;)
  • pfBlockerNG security (dynamic firewall rules)

    1
    0 Votes
    1 Posts
    147 Views
    No one has replied
  • DNSBL deny all except whitelisted

    18
    0 Votes
    18 Posts
    3k Views
    NollipfSenseN
    @PaulMon123 said in DNSBL deny all except whitelisted: All I want to do is to block any DNS requests (except ones to specific services) to prevent data leaks using DNS tunneling. It seems that most of what I shared geared to accomplishing this, especially when an IPS/IDS is added to the mix. I take it others has physical access to the "secure environment" or it's a server. This data leaks using DNS tunneling is a hot topic, a potential headache, and I am hoping a package with DNS quarantine coming soon.
  • pfBlockerNG Alias Firewall Rule Question

    16
    0 Votes
    16 Posts
    2k Views
    NollipfSenseN
    @tman222 Well, I think it would be pfSense that provided pfBlockerNG widget the packet info.
  • Thanks from my wife

    7
    1 Votes
    7 Posts
    927 Views
    BBcan177B
    Make sure you are using pfBlockerNG-devel which is much improved over the release version.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.