Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Put IoT reject rules on WAN or LAN?

    Scheduled Pinned Locked Moved Firewalling
    5 Posts 3 Posters 645 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L Offline
      left4apple
      last edited by left4apple

      Hi guys. Quick question about firewall. All of my IoT devices are under the IP range of 10.0.1.0/24 and I want to ban their access to the Internet. There are two places where I can put the rule,

      1. WAN rules. Reject traffics from 10.0.1.0/24 to !RFC1918
      2. LAN rules. The same rule

      Is there a preference that one is better than the other? Thanks!


      Update: Seems my understanding is WRONG. The rule should only be placed on LAN firewall since the firewall only takes effect on "INCOME" traffics

      johnpozJ S 2 Replies Last reply Reply Quote 0
      • johnpozJ Offline
        johnpoz LAYER 8 Global Moderator @left4apple
        last edited by

        @left4apple well you can put outbound rules in the floating tab.

        But why would you let traffic into pfsense, just to stop it from leaving.. If you don' want some traffic to get to the internet, its best to stop it before it even enters pfsense.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

        L 1 Reply Last reply Reply Quote 0
        • L Offline
          left4apple @johnpoz
          last edited by

          @johnpoz Hi not sure if I understand the comment correctly. The IoT devices gets DHCP IP from pfSense, and they keep trying to connect to cloud servers. I only want to use them locally via RTSP.

          What would be the correct way to stop the traffic from getting into pfSense? Thanks

          johnpozJ 1 Reply Last reply Reply Quote 0
          • S Offline
            SteveITS Rebel Alliance @left4apple
            last edited by

            @left4apple said in Put IoT reject rules on WAN or LAN?:

            The rule should only be placed on LAN firewall since the firewall only takes effect on "INCOME" traffics

            This comment is correct. If you are trying to block DNS and/or pfSense port 443 you can block from the IOT network to This Firewall which is all IPs on pfSense.

            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
            Upvote 👍 helpful posts!

            1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @left4apple
              last edited by

              @left4apple said in Put IoT reject rules on WAN or LAN?:

              What would be the correct way to stop the traffic from getting into pfSense?

              As you already stated - on the lan side of pfsense.. Before it enters pfsense..

              If someone came to your front door and said hey can I walk through your house to go to your back yard.. Would you stop right there at the front door, or would you let them stomp their muddy feet all through your house and then when they were going to exit your back door say - hey wait a minute I don't want you to go there..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.