Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Request for examples of working guest network rules

    Scheduled Pinned Locked Moved Firewalling
    22 Posts 5 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SteveITS Galactic Empire @DominikHoffmann
      last edited by

      @dominikhoffmann Rule 2, and the other rule blocking access to the Guest interface IP, don’t block from Guest to the pfSense LAN or WAN or other interfaces. That’s where you should use This Firewall.

      Re: future, that’s a common complaint especially for people with lots of VLANs or interfaces. Some people use an RFC1918 alias and then “!RFC1918” (Not RFC1918) to do the opposite though that syntax has had occasional bugs over the years IIRC. They also have note:
      “Using Invert Match on <interface> Net macros such as LAN net can lead to undesired rule behavior when the interface also uses Virtual IP addresses. This is due to traffic matching against the interface network OR the VIPs. For example, given a Subnet of 192.168.1.0/24, a VIP of 10.0.0.1/32, and a rule with a negated interface macro such as pass on $LAN from any to ! $LAN_net, traffic destined to 192.168.1.100 will pass because the destination IP address does not match the VIP.”

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      JKnottJ D 2 Replies Last reply Reply Quote 1
      • JKnottJ
        JKnott @DominikHoffmann
        last edited by

        @dominikhoffmann said in Request for examples of working guest network rules:

        I believe, I don’t quite understand the distinction. Would you mind explaining? I am still somewhat of a newbie.

        "This firewall" would allow pinging to all interfaces. I allow pinging to only the VLAN interface that the guest WiFi connects to.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 1
        • JKnottJ
          JKnott @SteveITS
          last edited by

          @steveits

          Is there a list of built in aliases anywhere? I looked in the pfSense book and didn't see one.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          S 1 Reply Last reply Reply Quote 0
          • D
            DominikHoffmann @SteveITS
            last edited by

            @steveits: Is this the change you are thinking I should make?

            Screenshot 2023-02-21 at 9.30.07 AM.png

            S 1 Reply Last reply Reply Quote 0
            • S
              SteveITS Galactic Empire @DominikHoffmann
              last edited by

              @dominikhoffmann said in Request for examples of working guest network rules:

              @steveits: Is this the change you are thinking I should make?

              Yes

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote 👍 helpful posts!

              1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @JKnott
                last edited by

                @jknott RFC1918 is user created, just a lot of people use that name. Re default, I think it’s just This Firewall, interface IPs, and interface subnets.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                M JKnottJ 2 Replies Last reply Reply Quote 0
                • M
                  mcury @SteveITS
                  last edited by

                  I did like this:

                  32146c11-9791-4554-844c-b5c213f83a76-image.png

                  Internal networks contains all my subnets.
                  Just be sure to assign an external DNS to your GUEST subnet through DHCP and that is it.

                  dead on arrival, nowhere to be found.

                  D 1 Reply Last reply Reply Quote 1
                  • D
                    DominikHoffmann @mcury
                    last edited by

                    @mcury said in Request for examples of working guest network rules:

                    Internal networks contains all my subnets.

                    Is your “internal_networks” defined through Interfaces → Interface Groups? It must not be, because as far as I can tell you can’t use an interface group as a destination in a rule.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      mcury @DominikHoffmann
                      last edited by

                      @dominikhoffmann Internal networks is a network alias.
                      Inside of it, I added all my internal networks.

                      The second rule blocks to this firewall, so GUEST users can't access the firewall (if this rule didn't exist, GUEST users would be able to access pfsense GUI through my WAN IP, which is dynamic).

                      The third rule allows my users to go to the Internet, do everything they want, using a failover gateway group.

                      They use external DNS servers assigned by DHCP.

                      dead on arrival, nowhere to be found.

                      D 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @SteveITS
                        last edited by

                        @steveits

                        I know about user created aliases. I'm asking about aliases that are built into pfSense and available without having to create them.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • D
                          DominikHoffmann @mcury
                          last edited by

                          @mcury: I don’t have the ability to create network aliases:

                          Screenshot 2023-02-21 at 11.56.46 AM.png

                          You must have something different. Can you explain exactly, where you set up your network alias?

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            mcury @DominikHoffmann
                            last edited by

                            @dominikhoffmann

                            Just include your networks inside of the alias:
                            Select IP, then there will be a Type field, select Network(s)

                            66141865-2a6f-4937-9fd9-b882ae93014b-image.png

                            dead on arrival, nowhere to be found.

                            1 Reply Last reply Reply Quote 1
                            • S SteveITS referenced this topic on
                            • S SteveITS referenced this topic on
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.