Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Admin LAN Best Practices

    General pfSense Questions
    6
    8
    1.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pinballwiz
      last edited by

      Hello,

      I have segmented my network so that the admin interfaces of all my network equipment is on one LAN / pfSense port (i.e. pfSense admin GUI, managed switch interfaces, Unifi Controller and Admin Laptop). The other LAN & VLAN subnets do not have access. No problems with the setup, all works well. I manage the network locally from a dedicated Laptop. However I find that I need WAN access on the admin network for firmware updates, Admin Laptop OS updates, time servers etc. It would seem that limiting or inhibiting WAN communications would be best for sensitive admin interfaces, but doesn't seem feasible. I could limit what the network talks to via allowed aliases however with changing destination servers or timeservers behind proxies I could spend allot of time administration my admin LAN. Is it wise to allow this admin LAN to talk to the WAN? What are best practices?

      Just to clarify I am not talking about remote admin management, only local.

      johnpozJ P 2 Replies Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        As you say you probably need some access for firmware updates but you can still restrict what can reach out and on what ports. Allow only what you need. As you also said though it's likely unrealistic to set a limited destination IP for firmware updates, they are probably hosted in a CDN with dynamic IPs.

        Steve

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @pinballwiz
          last edited by

          @pinballwiz you could always just enable internet when your going to do a firmware upgrade, and then just disable it again when your done with your updates.

          It would be a pita to figure configure all the places you might download firmware from for multiple devices, etc.

          Time services shouldn't be an issue just pull time from pfsense. Pfsense can talk to as few or as many ntp servers you want, etc.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • B
            bPsdTZpW
            last edited by bPsdTZpW

            I approach this issue by allowing outbound-only WAN access from the admin net, but using different limited accounts on the admin computer for network admin vs. for general browsing. This approach makes it unlikely that anything will penetrate the admin browser (running under limited account a and used only to administer network devices) and also that anything that penetrates the general browsing browser (running under limited account b) will find it difficult to jump to the admin network.

            I also firewall the admin browser account on the admin computer so that it doesn't have access to anything but the network devices' IPs. That prevents accidentally doing general browsing on the admin browser.

            Finally, I never run browsers, email clients, or any other network-using software under administrator (root) accounts.

            This is looser than it could be, but also more convenient.

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @bPsdTZpW
              last edited by

              @bpsdtzpw

              Why so restrictive on browsers, devices, etc ?
              If you want to remove 95 % of all possible issues, start by removing yourself from the equation.
              That is, you still have to admin devices, so do what works best : learn to recognize the risks. All this "Internet" related stuff is very recent, and ..... guess what : the Internet was invented to document itself, and easy to access.

              About the dangers of devices, devices etc : use a PC portable without a (hard) disk. Make your own "USB-with-Open source OS + browser + SSH client etc." Boot from it, and do your work. Nothing will be kept on the device, as it is a read-only stored OS.

              Btw : I probably have boatloads of risky devices behind my pfSense, as I'm using a captive portal for our clients. They can use our router (pfSense captive portal, and is by nature an untrusted 'LAN' network) but they can't access pfSense itself : traffic flows through it, without any effect on the router. This works fine for the last decade or so.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • B
                bPsdTZpW
                last edited by

                I administer a home network, so my safety/security tradeoffs are a bit different than they would be were I administering an enterprise network. In particular, I want to be able to use one machine for both network administration and general use.

                Therefore, to keep the network safe, I have to keep the admin computer extra safe. That means going the extra mile to avoid malware by, e.g., running browsers for different purposes in different limited accounts, using the admin computer's firewall to prevent general browsing in the network admin browser, etc.

                1 Reply Last reply Reply Quote 0
                • NollipfSenseN
                  NollipfSense
                  last edited by

                  To me, the best LAN practice is all about the Firewall rules as well as using one browser specifically for admin work, in my case, Opera. I even use a Mikrotik LAN king (the new RB450x4) as guard and the only devices not allowed to go out are the indoor cameras, since we sometimes walk around in the house naked. pfSense is our main gatekeeper to the world.

                  pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                  pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                  1 Reply Last reply Reply Quote 0
                  • P
                    pinballwiz @pinballwiz
                    last edited by

                    @pinballwiz Appreciate the feedback. My take away from the post thus far seems to be the following: Allow the admin net outbound WAN access but use a dedicated OS/browser for admin work.

                    That was pretty much were I am, so it is good to get some validation:
                    In my current setup I'm allowing outbound WAN access to the admin LAN (during working hours) and using a Linux laptop dedicated only for admin work (non-root account of course). I keep it updated/patched and it also runs the Unifi controller software for management and firmware updates of Unifi equipment.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.