Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfBlockerNG Alias

    Scheduled Pinned Locked Moved pfBlockerNG
    17 Posts 8 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bartkowski
      last edited by

      Maybe you haven't clicked the correct 'i'.

      Select the Action for Firewall Rules on lists you have selected.
      Default: Disabled
      'Disabled' Rules: Disables selection and does nothing to selected Alias.

      'Deny' Rules:
      'Deny' rules create high priority 'block' or 'reject' rules on the stated interfaces. They don't change the 'pass' rules on other interfaces. Typical uses of 'Deny' rules are:
      Deny Both - blocks all traffic in both directions, if the source or destination IP is in the block list
      Deny Inbound/Deny Outbound - blocks all traffic in one direction unless it is part of a session started by traffic sent in the other direction. Does not affect traffic in the other direction.
      One way 'Deny' rules can be used to selectively block unsolicited incoming (new session) packets in one direction, while still allowing deliberate outgoing sessions to be created in the other direction.
      'Permit' Rules:
      'Permit' rules create high priority 'pass' rules on the stated interfaces. They are the opposite of Deny rules, and don't create any 'blocking' effect anywhere. They have priority over all Deny rules. Typical uses of 'Permit' rules are:
      To ensure that traffic to/from the listed IPs will always be allowed in the stated directions. They override almost all other Firewall rules on the stated interfaces.
      To act as a whitelist for Deny rule exceptions, for example if a large IP range or pre-created blocklist blocks a few IPs that should be accessible.
      'Match' Rules:
      'Match' or 'Log' only the traffic on the stated interfaces. This does not Block or Reject. It just Logs the traffic.
      Match Both - Matches all traffic in both directions, if the source or destination IP is in the list.
      Match Inbound/Match Outbound - Matches all traffic in one direction only.
      'Alias' Rules:
      'Alias' rules create an alias for the list (and do nothing else). This enables a pfBlockerNG list to be used by name, in any firewall rule or pfSense function, as desired.
      Options  - Alias Deny,  Alias Permit,  Alias Match,  Alias Native

      'Alias Deny' can use De-Duplication and Reputation Processes if configured.

      'Alias Permit' and 'Alias Match' will be saved in the Same folder as the other Permit/Match Auto-Rules

      'Alias Native' lists are kept in their Native format without any modifications.
      Note:
      When manually creating 'Alias' type firewall rules; Do not add (pfB_) to the start of the rule description, use (pfb_) (Lowercase prefix). Manually created 'Alias' rules with 'pfB_' in the description will be auto-removed by package when 'Auto' rules are defined.

      1 Reply Last reply Reply Quote 0
      • E
        Exocomp
        last edited by

        Seriously?  Come on now guys.

        I get that info block but that doesn't give details on Alias Permit, Alias Match, Alias Native.

        Regarding Alias it states: "'Alias' rules create an alias for the list (and do nothing else). This enables a pfBlockerNG list to be used by name, in any firewall rule or pfSense function, as desired."

        Ok I get that but what is the difference between Permit, Match, Native ??

        1 Reply Last reply Reply Quote 0
        • B
          bartkowski
          last edited by

          To answer your initial question, use Alias Match.

          non-alias Permit (Inbound|Outbound) would apply when you're using pfB to setup your own rules for whichever direction, same idea for Deny. Hope this helps a bit.

          1 Reply Last reply Reply Quote 0
          • E
            Exocomp
            last edited by

            No that doesn't help.

            And don't know why you are referring to "non-alias Permit" that is not what I was referring to.

            You also say to use Alias Match but I tried "Alias Permit" and that seems to be working.  So really this is not helpful.

            And so again I ask what is the difference between "Alias Permit", "Alias Match", and "Alias Native" ?

            1 Reply Last reply Reply Quote 0
            • BBcan177B
              BBcan177 Moderator
              last edited by

              When you select "Permit" it will create rules to allow traffic.

              When you select "Match" it will only log the packets and nothing else.

              When you select "Native" its the same as "Deny" except that there is no Suppression or Deduplication, the Feeds are downloaded and used in its native format.

              There are "Auto" generated rules, and then there are "Alias" type rules. With "Alias" type rules, the pkg makes the Aliastable with the IPs, and then you have to manually create the Firewall rules according to your network needs.

              "Experience is something you don't get until just after you need it."

              Website: http://pfBlockerNG.com
              Twitter: @BBcan177  #pfBlockerNG
              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

              1 Reply Last reply Reply Quote 1
              • E
                Exocomp
                last edited by

                Hi BBcan177, first of all thanks for creating and supporting pfBlockerNG.

                With "Alias" type rules, the pkg makes the Aliastable with the IPs, and then you have to manually create the Firewall rules according to your network needs.

                Specifically with the Alias type rules there are "Alias Permit", "Alias Match" and "Alias Native", can you elaborate what they do in the context of Alias specifically.  What I mean is that I use "Alias Permit" with a rule that I created but others have recommended using "Alias Match" and even some say use "Alias Native" but what is the difference specifically in the context of Alias ??

                1 Reply Last reply Reply Quote 0
                • BBcan177B
                  BBcan177 Moderator
                  last edited by

                  When you select any of the Alias types [ Deny, Permit, Match or Native ], they do not create any Firewall rules… So in that sense there is no difference between any of those options... However, If you are going to use this Alias for a "Permit" rule, then select "Alias Permit"...

                  Alias Match, would be used for a rule whereby you just want to log packets that match the IPs in the list, but do not block or permit them... But selecting "Alias Match" and configuring the rule to be a "Permit" action is in essence the same.... I would recommend to use Alias Permit for permit rules, and Alias Match for Match type rules.

                  Alias Native is typically used instead of Alias Deny, where its used for a Block Type action, but the IPs do not go thru the Suppression or Deduplication processes... IE: they remain native as per the source of the Feed.

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  A 1 Reply Last reply Reply Quote 3
                  • E
                    Exocomp
                    last edited by

                    @BBcan177 thanks for the clarification that is the info I was looking for as it was not clear in the info block.

                    Based on your info and comparing it to the suggestions I got from others it seems they were were confused so this should help others too.

                    1 Reply Last reply Reply Quote 3
                    • A
                      aborsic @BBcan177
                      last edited by aborsic

                      @bbcan177 first of all thanks for developing and supporting pfBlockerNG which is a great tool to have.

                      To recap the discussion, would it be correct to state the following:

                      1. "Alias Permit", "Alias Deny", "Alias Match", and "Alias Native" do not create any rule, but they just create lists of IPs (aliases)
                      2. There is not difference in the IP lists created by "Alias Permit", "Alias Deny", "Alias Match", and "Alias Native"
                      3. The "Permit", "Deny", "Match", and "Native" indicates only the intended purpose of the created alias, but actually selecting one alias type versus an other would not make any difference.

                      This what I understood from the discussion, and would be very thankful if you kindly confirm whether this is correct.

                      Thanks,

                      Andrea

                      P 1 Reply Last reply Reply Quote 1
                      • P
                        Patch @aborsic
                        last edited by

                        @aborsic said in PfBlockerNG Alias:

                        There is not difference in the IP lists created

                        I don’t think that is correct

                        @bbcan177 said in PfBlockerNG Alias:

                        Alias Native is typically used instead of Alias Deny, where its used for a Block Type action, but the IPs do not go thru the Suppression or Deduplication processes... IE: they remain native as per the source of the Feed

                        So while using Alias Native would have the same net effect, using it would involve more processing when updating the list but less processing while using the list.

                        I don’t know if the optimisation is different between the other lists.

                        A S 2 Replies Last reply Reply Quote 1
                        • A
                          aborsic @Patch
                          last edited by

                          @patch Thank you for the clarification

                          1 Reply Last reply Reply Quote 0
                          • S
                            SteveITS Galactic Empire @Patch
                            last edited by

                            @patch said in PfBlockerNG Alias:

                            Alias Native would have the same net effect, using it would involve more processing when updating the list but less processing while using the list

                            Technically it would be the other way around, Alias Native does not look for duplicates.

                            However you should all probably read this thread which seems to have found that Alias Deny will remove IPs found in other lists which may not be the result you want, if rules for both lists are not denying the same port.

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            1 Reply Last reply Reply Quote 2
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.