Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Disallowing access from IP connected to one port of a filtered bridge

    Scheduled Pinned Locked Moved Firewalling
    16 Posts 2 Posters 765 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V Offline
      viragomann @Bear
      last edited by

      @bear
      If you're testing and pfSense passes any traffic it creates a state for this connection.
      When you create a block rule after that, the matching traffic is passed anyway as long as the state is there.

      BearB 1 Reply Last reply Reply Quote 0
      • BearB Offline
        Bear @viragomann
        last edited by

        @viragomann

        The only rule I've got that MIGHT be overruling these is to allow all traffic from the network out....it's left over from my old config where I wasn't segmenting. Is there a better rule to allow my assigned subnet the ability to get out to the 'net without overriding the other rules?

        Capture3.PNG

        V 1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann @Bear
          last edited by

          @bear
          You can create an alias for RFC 1918 networks and set it as destination with "invert match". So the rule is only applied to non-RFC 1918 destinations.

          But you can simply move up the block rule to the top, save the order and flush the states.

          It's in general a good advice to have rules with the smaller source or destination ranges at the top.

          BearB 1 Reply Last reply Reply Quote 0
          • BearB Offline
            Bear @viragomann
            last edited by

            @viragomann

            Not sure that would work. None of the IPs being used are RFC 1918. They're all public. I have an alias for my public IP block though. Not sure what the best logic would be to redo this rule to allow everything on the network out, but still blocking individual IPs on one bridge meme from contacting another IP on another bridge member.

            V 1 Reply Last reply Reply Quote 0
            • V Offline
              viragomann @Bear
              last edited by

              @bear said in Disallowing access from IP connected to one port of a filtered bridge:

              None of the IPs being used are RFC 1918. They're all public

              Yeah, that's why you should use it in conjunction with "invert match".

              BearB 1 Reply Last reply Reply Quote 0
              • BearB Offline
                Bear @viragomann
                last edited by

                @viragomann Alright, but that rule would still apply to my internal addresses, as they're non-RFC 1918 destinations. How is that any functionally different than my current rule, or am I missing something?

                V 1 Reply Last reply Reply Quote 0
                • V Offline
                  viragomann @Bear
                  last edited by

                  @bear said in Disallowing access from IP connected to one port of a filtered bridge:

                  Alright, but that rule would still apply to my internal addresses, as they're non-RFC 1918 destinations

                  I see. I guess, there might be reasons for this. Whatever.
                  So you need specific aliases of course.

                  BearB 1 Reply Last reply Reply Quote 0
                  • BearB Offline
                    Bear @viragomann
                    last edited by

                    @viragomann The only thing I can think to do are rules for IP groups that allow them access to everything, and specific bridge firewall rules for the IPs on other network segments that 1) Allow access to anything that is NOT in my subnet (the reverse rule, except using an alias for my /25), and 2) Allow rules for those IPs specifically allowing access to ports on my wired network.

                    Does that jibe with your logic?

                    Thanks for the help, BTW. I'm not trying to be difficult. It's just a "different" setup than most use.

                    V 1 Reply Last reply Reply Quote 0
                    • V Offline
                      viragomann @Bear
                      last edited by

                      @bear
                      If all you want to achieve is blocking access to the Proxmox GUI, why don't you simply put this rule to the top of the rule set.
                      It is limited to the concerned destination IPs and port, so it should not influence any other traffic.

                      I'm not trying to be difficult. It's just a "different" setup than most use.

                      In fact. Having wifi and IoT devices within a public IP range seems pretty odd to me.

                      BearB 2 Replies Last reply Reply Quote 0
                      • BearB Offline
                        Bear @viragomann
                        last edited by

                        @viragomann

                        @viragomann said in Disallowing access from IP connected to one port of a filtered bridge:

                        @bear
                        If all you want to achieve is blocking access to the Proxmox GUI, why don't you simply put this rule to the top of the rule set.
                        It is limited to the concerned destination IPs and port, so it should not influence any other traffic.

                        I can try that. But it's only one in a litany of rules. If that works, I'll try moving others to the top of the ruleset.

                        In fact. Having wifi and IoT devices within a public IP range seems pretty odd to me.

                        There are only a few wifi devices, and the ones that are there are pretty locked-down. As far as the IOT devices, they're all NATted behind a single IP that's on its own port in the filtered bridge that I'm using rules like the proxmox one to more or less only have Internet access. In that regard, the fact that the IP in front of the NAT is static is immaterial. That also happens to be where my guest network resides.

                        1 Reply Last reply Reply Quote 0
                        • BearB Offline
                          Bear @viragomann
                          last edited by

                          @viragomann I did try moving the original Proxmox rule to the top of my rule set. No difference.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.