Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfBlockerNG and floating rules: To float or not to float?

    Scheduled Pinned Locked Moved pfBlockerNG
    3 Posts 3 Posters 774 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • MarinSNBM
      MarinSNB
      last edited by

      Hi everyone.

      I posted this on Lawrence Systems forums too and doing the same here to reach out to a wider audience.

      I have reviewed several pfBlocker-NG setups on YouTube and other sites, including Tom’s videos, and wanted to get your thoughts, suggestions and recommendations on whether you prefer setting up floating rules up with this pfSense package or not.

      Thanks in advance!

      Netgate 6100 Max pfSense+
      —>Unifi Aggregation/24 Pro PoE/24 PoE Enterprise switches
      —> UCK2+
      —> 3x U6E APs

      keyserK 1 Reply Last reply Reply Quote 0
      • keyserK
        keyser Rebel Alliance @MarinSNB
        last edited by

        @MarinSNB said in pfBlockerNG and floating rules: To float or not to float?:

        Hi everyone.

        I posted this on Lawrence Systems forums too and doing the same here to reach out to a wider audience.

        I have reviewed several pfBlocker-NG setups on YouTube and other sites, including Tom’s videos, and wanted to get your thoughts, suggestions and recommendations on whether you prefer setting up floating rules up with this pfSense package or not.

        Thanks in advance!

        I generally stay away from floating rules in almost all cases. I much prefer to be able to see to current rules hierachy on each interface. So I create (and clone) my pfBlockerNG rules to all interfaces - takes a while, but is very much easier to interpret afterwards.
        The only exception is that I do use floating rules for access to the pfBlockerNG/Unbound sink webserver’s VIP address

        Love the no fuss of using the official appliances :-)

        1 Reply Last reply Reply Quote 2
        • D
          darcey
          last edited by darcey

          I have some pfBlocker generated rules as floating/quick. Some of which protect a few forwarded ports on the WAN interface.
          I have logging turned on for these rules and, whilst it works as expected. one thing puzzles me: The logged DST IP is sometimes the WAN interface and sometimes the internal forwarded-to IP. I don't understand why this variation occurs. Is it a consequence of 'floating' rules? Whilst the rules concerned are 'floating', they're assigned only to the WAN interface. It seems as if the rule can be evaluated before or after NAT occurs?

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.