Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Smacked from sort of experienced back to novice

    Scheduled Pinned Locked Moved General pfSense Questions
    15 Posts 7 Posters 704 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks @Digiguy
      last edited by bmeeks

      @Digiguy said in Smacked from sort of experienced back to novice:

      I was interested in hosting a DMZ. Now my I have to figure out if I do it at home or at a place like Cloudflare.

      If you intend to host a server behind your firewall, then a lot of my formal "simple approach" is no longer applicable. But I would strongly consider hosting a server at a dedicated hosting service.

      I read your initial post as askng about simplicity versus tight security.

      1 Reply Last reply Reply Quote 0
      • DigiguyD
        Digiguy @bmeeks
        last edited by

        @bmeeks WOW! 1st I Thank you for the detailed response! pretty much in line with others. you stated two ends of the extremes. I would like to be somewhere in the middle. I feel guilty with the "Set it & Forget It" mentality. To be somewhere in the middle I agree a LOT of Google searches and Netgate searches will be required and as another poster said... time...

        Again, so much to learn, so litte time :)

        bmeeksB 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @Digiguy
          last edited by bmeeks

          @Digiguy said in Smacked from sort of experienced back to novice:

          Again, so much to learn, so litte time :)

          Learning can be fun and a great challenge. Just remember that until you gain a lot of experience you may inadvertently break stuff. Make frequent manual config backups in pfSense so you can quickly roll back if you make a mistake and the wrath of momma and/or the kids comes down upon you.

          But many users just want a functional home network. You can get that and still have plenty of security following the process I described in my post above.

          DigiguyD 1 Reply Last reply Reply Quote 1
          • NollipfSenseN
            NollipfSense @SteveITS
            last edited by

            @SteveITS said in Smacked from sort of experienced back to novice:

            IPv6 is a tool, no harm in using it.

            You're so right and message to me as well...thanks for the well-put short, sweet.

            pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
            pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

            1 Reply Last reply Reply Quote 0
            • DigiguyD
              Digiguy @bmeeks
              last edited by

              @bmeeks

              @bmeeks said in Smacked from sort of experienced back to novice:

              Learning can be fun and a great challenge.

              EXACTLY! And a big reason I am exploring, experimenting, and as you said breaking things. I always say, "A mistake is okay as long as you learn from it (and no one gets hurt)"

              1 Reply Last reply Reply Quote 0
              • M
                mer
                last edited by

                I like to start with pictures.
                Draw a box, label it "pfSense".
                Now draw arrows, label them WAN, LAN1, LAN2
                Draw a few smaller boxes to represent devices and connect them to the different LANs

                Then think about what traffic you want to allow, what directions, what interface.
                Remember that by default, pfSense will drop traffic into WAN from the outside world unless there is state.
                That means "something from my network initiated traffic to something in the outside world, pfSense keeps state and allows the responses from the outside world".

                That lets me write words that lead to being able to write the rules.

                1 Reply Last reply Reply Quote 0
                • Bob.DigB
                  Bob.Dig LAYER 8 @Digiguy
                  last edited by

                  @Digiguy said in Smacked from sort of experienced back to novice:

                  Guess I was under the assumption to block all outbound unless I know what it is...

                  That is a very hard task I guess almost no one is doing. Block it all, for some special VLAN with IoT, or let it all go out to the internet, not your local subnets though. There is no in between with that. ๐Ÿ˜‰

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yup. You might find basic web browsing works fine with only a few outbound ports allowed (80, 443, 53) but you'll soon find out just how much other stuff uses other ports. ๐Ÿ˜‰

                    You can add allow rules for services as you find them but that can take a while.

                    DigiguyD 1 Reply Last reply Reply Quote 0
                    • DigiguyD
                      Digiguy @stephenw10
                      last edited by

                      @stephenw10 said in Smacked from sort of experienced back to novice:

                      you'll soon find out just how much other stuff uses other ports.

                      Definitely the lesson I have learned . So then as a "network administrator" how does one "monitor" or check to make sure all well? I have looked through the firewall logs and I get lost rather quickly...

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        It depends who/what the users are. If they are real people they usually let you know pretty quick when things don't work. ๐Ÿ˜‰

                        If it's IoT devices etc you have to test yourself.

                        As with all things it's a question of security vs convenience. Though the actual security benefits are questionable at best and the inconvenience is significant so.....

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.