Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OPT1 needs LAN DNS access

    Scheduled Pinned Locked Moved General pfSense Questions
    109 Posts 5 Posters 19.6k Views 6 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L Offline
      lewis @jsmiddleton4
      last edited by

      @jsmiddleton4 said in OPT1 needs LAN DNS access:

      @stephenw10

      And if you need to access the AP directly as in LAN cable to the AP. While a static IP assigned via the router gets to nearly the same place, the IP stays the same, if for some reason the router is out of the picture, good luck accessing the AP without a factory reset turning the AP back into a router.

      Before doing a reset, you should still be able to see the AP in the wireless list no matter its LAN IP is by using a wireless laptop. Then you could access the AP's admin page since if would be the laptops gateway IP.

      L J 2 Replies Last reply Reply Quote 0
      • L Offline
        lewis @lewis
        last edited by

        Maybe it's a reserved static DHCP IP :).

        It really is reserved but once reserved, it's outside of the DHCP pool making it static within the DHCP server LOL.

        1 Reply Last reply Reply Quote 0
        • J Offline
          jsmiddleton4 @lewis
          last edited by

          @lewis

          Giving the AP its own static IP eliminates any variables including if a DHCP server is up and running. I like eliminating variables.

          johnpozJ 1 Reply Last reply Reply Quote 1
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator @jsmiddleton4
            last edited by johnpoz

            @jsmiddleton4 said in OPT1 needs LAN DNS access:

            including if a DHCP server is up and running

            This is a misconception as well - dhcp server being offline doesn't stop clients from working that had already gotten a lease. It only prevents clients from getting a new IP or renewing their lease. If you have no new clients coming on to the network.

            If your lease was say 4 days, worse case scenario your lease would be at 2 days when dhcp goes offline - you would have then 2 days to notice your dhcp server is offline before clients started dropping off when their lease expired ;)

            Setting a reservation, or call it a static mapping you will has way more advantages then setting the IP on the device itself. You can now change options like dns,ntp, domain or gateway or even the mask or even the IP range being used without having to actually touch a client and make these changes.

            With the use of reservations - I can easy change a devices IP without having to mess with it. Say its a pain in the ass on stuff like iot or printers are big example. Where you have to go through some arcane menu system using up down arrows and such on the little menu on the printer. If I want my printer IP to be something different, just change the reservation and reboot the printer - bobs your uncle its now on the new ip.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            L 1 Reply Last reply Reply Quote 2
            • L Offline
              lewis @johnpoz
              last edited by

              @johnpoz said in OPT1 needs LAN DNS access:

              With the use of reservations - I can easy change a devices IP without having >to mess with it. Say its a pain in the ass on stuff like iot or printers are big >example.

              Exactly and keep track of devices by Description names, MAC and IPs set via the DHCP server. It's how I manage lots of devices.

              1 Reply Last reply Reply Quote 0
              • ? Offline
                A Former User @lewis
                last edited by

                @lewis, I am glad that in part it is already solved, but what about this?

                It says I don't want anyone to be able to get to pfsense management but it has a default rule on LAN (You have to remove it) to correct this.

                b57f85cc-bec2-407d-a42d-7dd19b864556-image.png

                @lewis said in OPT1 needs LAN DNS access:

                I want to prevent opt1 and opt2 from seeing the pfsense gui.

                L 1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  That rule only passes traffic from LAN it would not allow devices on OPT1 or OPT2 to access anything.

                  1 Reply Last reply Reply Quote 0
                  • L Offline
                    lewis @Guest
                    last edited by

                    @silence Oops, yes, I've removed that now. Thank you for pointing that out.

                    ? johnpozJ 2 Replies Last reply Reply Quote 0
                    • ? Offline
                      A Former User @lewis
                      last edited by

                      @lewis, a pleasure to help you, anything else you need here we are.

                      1 Reply Last reply Reply Quote 0
                      • L Offline
                        lewis
                        last edited by

                        Wait now, do I have to uncheck that then or not?
                        I had already tested and clients from anything other than LAN could not get to pfsense.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Offline
                          johnpoz LAYER 8 Global Moderator @lewis
                          last edited by

                          @lewis said in OPT1 needs LAN DNS access:

                          yes, I've removed that now

                          You removed what the anti-lock out rule? I really wouldn't recommend that.. If your concerned about devices accessing pfsense, don't put them on the pfsense "lan" interface. Put them on a different vlan or interface.

                          In a locked down scenario, the "lan" makes a perfect admin network. Where the only devices on this network are admin.. Since it has the antilock out rule.

                          More likely than not, if you remove that you are going to at some point lock yourself out ;) hehehe.

                          As mentioned by Steve already - the rules on LAN have zero to do with what optX can do..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          ? 1 Reply Last reply Reply Quote 0
                          • ? Offline
                            A Former User @johnpoz
                            last edited by

                            @johnpoz, Every day I have to provide support to people who ignore the default settings. simply because your system works fine.

                            @stephenw10 good to know that 2 admins defend the default settings.

                            1 Reply Last reply Reply Quote 0
                            • L Offline
                              lewis
                              last edited by

                              The LAN side is the only side that should have access to the firewall.
                              The additional networks should not which is why I still had that the anti-lockout unchecked. I did that based on reading up about anti-lockout and it seemed to be the right way/option.

                              ? johnpozJ 2 Replies Last reply Reply Quote 0
                              • ? Offline
                                A Former User @lewis
                                last edited by

                                @lewis, first remove the default rule, and then configure the blocking rule on each interface! If you have questions, how do you let me know? I'm here to help.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S Offline
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Those rules on the LAN interface only filter traffic from clients on the LAN. They have no influence on traffic from clients on OPT1 or OPT2.

                                  So if your goal is to prevent clients on OPT1/2 accessing the firewall then you need to check the rules on those interfaces.

                                  Those rules on LAN are fine.

                                  Steve

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ Offline
                                    johnpoz LAYER 8 Global Moderator @lewis
                                    last edited by johnpoz

                                    @lewis said in OPT1 needs LAN DNS access:

                                    I still had that the anti-lockout unchecked.

                                    What - dude only devices on the LAN network would have the antilock rule, not other interfaces have that. And if you create a new interface or vlan are ZERO rules on that interface.. You can not access anything from that network until your create rules.

                                    The only thing that would work is dhcp, if you enable that hidden rules are created so it will work.. But that is all until you actually create rules.

                                    How about you actually show us the rules you have placed on these other interfaces.

                                    edit: Here is an example locked down vlan/network - its have very limited access ping, dns, ntp and nothing else other than interface, can not access the firewall gu, can not access anything on any other vlan/network locally. etc..

                                    lockeddown.jpg

                                    It can ping pfsense IP on that interface - for connectivity validation, etc. They can be adjust how you see fit.. But we really need to see the rules you have on these network.. What is on the lan has zero do with anything.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • L Offline
                                      lewis
                                      last edited by

                                      Maybe we are getting out of sync.
                                      The only place that anti-lockout option is enable (or unchecked) is on the LAN.
                                      Meaning, in system, advanced, the anti-lockout is not checked.

                                      I tested from the other networks and they cannot reach the firewall which is what I wanted so I'm not following what the problem is. I did this based on some pfsense document I found which talked about anti-lockout.

                                      Some information suggested using this method, others suggested creating an alias and using that as a rule so it's kind of confusing to know which is the right way.

                                      ? johnpozJ 2 Replies Last reply Reply Quote 0
                                      • ? Offline
                                        A Former User @lewis
                                        last edited by

                                        @lewis said in OPT1 needs LAN DNS access:

                                        I tested from the other networks and they cannot reach the firewall which is what I wanted so I'm not following what the problem is.

                                        Don't worry, friend, don't drown in a glass of water, just do a tracert and set the route your team takes to get there.

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ Offline
                                          johnpoz LAYER 8 Global Moderator @lewis
                                          last edited by johnpoz

                                          @lewis said in OPT1 needs LAN DNS access:

                                          The only place that anti-lockout option is enable (or unchecked) is on the LAN.

                                          Ok that is correct, because it is not possible to enable that or disable that on any other interface.. Its a LAN thing only.. So yeah might be some confusion there that you were removing the antilock out for some reason.

                                          Some information suggested using this method

                                          It is possible if you wanted to restrict devices that were on your lan from getting to the web gui, to turn off the antilock out and set your own rules. But to be honest if you were going to be locking down your network, I wouldn't be putting anything on the "LAN" that shouldn't be there, ie admin only sort of thing.. Turning off the antilock rule should be carefully considered..

                                          There was recently a thread where they were locked out and had to refer them here
                                          https://docs.netgate.com/pfsense/en/latest/troubleshooting/locked-out.html

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • L Offline
                                            lewis
                                            last edited by

                                            I want to understand what is being said and it's not clear to me.

                                            From the OPT1 (10.0.0.1/24) and OPT2 (192.168.254.1/24) network, I cannot reach or even see anything on the 192.168.1.1 network using nmap.

                                            From clients on each network, I get a reply from devices on the same network as expected but none see anything on other networks.

                                            Of course, I need to block the firewall from any clients on each of those networks. The only network that should have access to the firewall is LAN.

                                            stephenw10S 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.