Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense and UFW

    General pfSense Questions
    4
    8
    1.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      Cannondale
      last edited by

      New to pfSense and currently running v2.6 with Snort.

      I'm currently running Linux Mint and Ubuntu Server on several machines with UFW enabled.
      All machines are behind the pfSense server.
      Is there a reason to continue to have UFW enabled on the Linux machines in addition to the protection provided by pfSense?

      bingo600B 1 Reply Last reply Reply Quote 0
      • bingo600B
        bingo600 @Cannondale
        last edited by

        @cannondale

        That depends ....
        Do you believe things originating from the internet is the only threat on your network ?

        What if one of your PC's get ransomware or ... a RAT

        If it's not a hassle to maintain the UFW rules, then id' leave them enabled.

        /Bingo

        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

        1 Reply Last reply Reply Quote 1
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Mmm, like all these things it comes down to security vs convenience.

          Any firewall on end hosts will see things that pfSense cannot. And can block that traffic as @bingo600 says.

          1 Reply Last reply Reply Quote 2
          • C
            Cannondale
            last edited by

            Thanks guys! Very helpful feedback!

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              Having your network protection only on the firewall has two rather serious drawbacks.

              First, pretty much every bit of network traffic these days is encrypted end-to-end. That means an IDS/IPS running on the firewall can't examine the packet payloads. The best it can do with encrypted traffic is examine some headers and related metadata (SNI, for example). But as the world moves to more and better encryption, even that small window into the network traffic flow is going to disappear.

              Second, the firewall is not privy to host-to-host communication on the same subnet because devices there talk directly to each other and bypass the firewall. So, if someone on your LAN manages to introduce malware via some non-network means (for instance, via a USB memory device), then that malware can spread from host to host on your LAN and the IDS/IPS on the firewall might never see the traffic. The solution here is HIDS (Host-based Intrusion Detection System).

              A comprehensive network security profile will utilize both a perimeter firewall and HIDS. An enterprise network (think Fortune 500 corporation) will likely use MITM (man-in-the-middle) technology to break the encryption chain via a proxy that can then send over a copy of the cleartext network traffic to an IDS/IPS for analysis.

              C 1 Reply Last reply Reply Quote 2
              • C
                Cannondale @bmeeks
                last edited by

                @bmeeks said in pfSense and UFW:

                HIDS

                Great information bmeeks! What package do you suggest for HIDS?

                bmeeksB 1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks @Cannondale
                  last edited by bmeeks

                  @cannondale said in pfSense and UFW:

                  @bmeeks said in pfSense and UFW:

                  HIDS

                  Great information bmeeks! What package do you suggest for HIDS?

                  That is definitely an operating system specific thing. Obviously an anti-virus client is at the top of the list. There are both free and paid versions, but I tend to stick with the free ones. For example, on Windows I use the built-in Microsoft provided products. For Linux and other systems, you have ClamAV.

                  The next step would be log scraping applications that examine the various host system logs for suspicious activity. Most of the clients I am familar with are paid versions with fairly hefty "corporate level" price tags. Tripwire is one example of a popular HIDS. There may be some freeware/open source alternatives, though. I've been out of that space (HIDS support) for quite a number of years, so I am sure things have changed there.

                  Lastly, you can utilize application control on host endpoints. There are paid versions of this and also likely freeware variations. Application control refers to system-level drivers/applications that physically prevent unauthorized binary code from executing on the host. AppLocker is an example from the Microsoft world. These can be highly effective anti-malware tools, but they are a major pain to administer on a network.

                  C 1 Reply Last reply Reply Quote 2
                  • C
                    Cannondale @bmeeks
                    last edited by

                    Many thanks for the detailed options and pointing me in the right direction bmeeks! You have definitely given me some good areas to research further.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.