Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Additional protection beyond the basic set up

    Scheduled Pinned Locked Moved Firewalling
    10 Posts 4 Posters 703 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      VMlabman
      last edited by

      What are some suggestions or resources that could help me go beyond the basic pfSense sent set up to better protect my network using pfSense. what settings what they do where I set them what more can I do other than pfBlocker and IDS any resources you can point me towards would be great especially YouTube videos but anything helps open to suggestions and opinions

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @VMlabman
        last edited by

        @VMlabman better protect your network in what sense?

        IDS really has little use for your typical home/smb setup.. And the learning curve is steep, and requires constant care. It really only still valuable with specific use cases.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        V A 2 Replies Last reply Reply Quote 0
        • V
          VMlabman @johnpoz
          last edited by

          @johnpoz

          What might you suggest that I do for the greatest security on and with my firewall? What changes should I make outside the basic install and basic restrictive rules for browsing the internet? Let me share a few rule ideas and see if you have any suggestions on how I would make them even more restrictive and or secure.

          ----- Screenshots --- Block Any to Any is @ the very bottom
          NTP.png Browsing.png Aliase_Breowsing.png Block_any_to_any.png

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @VMlabman
            last edited by johnpoz

            @VMlabman easier to just see your rules all at once vs details like that

            Blocking at the end would already be done by the default deny, and for browsing - udp is quite often used now, quic is the protocol that does it over UDP.. Looks like your only allow tcp.

            Where are you pointing to for dns, I don't see any rules that allow that.

            In what sense is blocking outbound more secure.. Anything that has already infected your machine is more than likely going to go out https.. Blocking outbound ports of a control thing, I don't want my users talking to some vpn service on port x or y, or their home plex server.

            Your box is already infected if trying to go to some odd port, so its too late to be honest. And it would be a pretty crappy badware thing if it just didn't use standard ports. Or something is redirecting you to something to infect you, and more than likely that would use a common port

            What your going to find trying to control every single port that can go outbound, is your constantly adjusting this when this doesn't work and that doesn't work, etc.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            V 1 Reply Last reply Reply Quote 0
            • V
              VMlabman @johnpoz
              last edited by VMlabman

              @johnpoz

              I changed my browsing for 80, 8080 & 443 from TCP to TCP/UDP. As for my dns In DNS Server Settings I point to quad9.
              As for more secure. It there a list of the top sat 500 or 1000 Domains I can put into an alias and use that and only that. I found this link: Top 1000 Websites By Ranking Keywords Any way for me to import a .csv into an alias? If I chose to do this? It's an idea. I just what a very secure environment and firewall. Any setting I can set in pfSense to better secure the WAN interface? What about a Proxy server?

              System_General_Setup.png System_General_Setup.png

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @VMlabman
                last edited by johnpoz

                @VMlabman you want to only allow top 1000 websites? Not a very good internet experience... I land on sites that for sure are not top 1000 all the time..

                I would be more concerned with blocking bad sites then limiting to what good sites I can go to.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                V 1 Reply Last reply Reply Quote 1
                • V
                  VMlabman @johnpoz
                  last edited by

                  @johnpoz

                  okay good to knwo

                  1 Reply Last reply Reply Quote 0
                  • JonathanLeeJ
                    JonathanLee
                    last edited by JonathanLee

                    You can use authenticated NTP,
                    you can also set up time constraints for blocking the internet all together after hours. For example, if you lock your doors after specific hours, you can also lock your network after specific hours, like early am hours.

                    There is also a way to separate specific traffic for game systems and stuff like that. You can set up ACLs for VPN to only allow in specific IP addresses that are known hosts too.

                    DNS over TLS can help add a layer of security, not much but it an extra step

                    Make sure to upvote

                    1 Reply Last reply Reply Quote 0
                    • A
                      Antibiotic @johnpoz
                      last edited by Antibiotic

                      @johnpoz What about to be more invisible to world. Lets say if someone will scanning my pfsense for ports and etc. What info he can get? pfSense version or outgoing traffic use by windows or linux and etc. I think he want to ask, how to be more invisible.

                      pfSense plus 24.11 on Topton mini PC
                      CPU: Intel N100
                      NIC: Intel i-226v 4 pcs
                      RAM : 16 GB DDR5
                      Disk: 128 GB NVMe
                      Brgds, Archi

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @Antibiotic
                        last edited by

                        @Antibiotic said in Additional protection beyond the basic set up:

                        Lets say if someone will scanning my pfsense for ports and etc.

                        And out of the box pfsense would be completely "stealth" if you will - there are no open ports to world out of the box.. So scanning your public IP would give them nothing.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.