Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block Websites for some users, but not others.

    pfBlockerNG
    3
    6
    234
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      Hyperion_Cyber
      last edited by

      Good day,

      I hope everyone is well. First off, apologies if this has been asked before.

      I want to block access to specific websites, while allowing a select few users to browse freely. I am new to pfsense and pfblockerng, and I would sincerely appreciate guidance on how I can accomplish this.

      Thank you in advance.

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @Hyperion_Cyber
        last edited by

        @Hyperion_Cyber There is a “group policy” section in pfBlocker where you can allow IPs. I believe you must select Python mode to see it.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        H 1 Reply Last reply Reply Quote 0
        • H
          Hyperion_Cyber @SteveITS
          last edited by

          @SteveITS Ok great! I found the group policy option. Do I need to do anything in port forwarding or firewall rules to ensure everything takes effect?

          S GertjanG 2 Replies Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @Hyperion_Cyber
            last edited by

            @Hyperion_Cyber Run an update in pfBlocker.

            In general devices need to use pfSense and not DOH/DOT for DNS, or they bypass blocking. pfBlocker has a checkbox in DNSBL to block that.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @Hyperion_Cyber
              last edited by Gertjan

              @Hyperion_Cyber said in Block Websites for some users, but not others.:

              I found the group policy option

              Be aware :
              For all your LAN (multiple) devices, if a request host name is present in one of your DNSBL lists, it will get rejected (DNS/unbound/the resolver ) returns 0.0.0.0 (or 10.10.10.1).
              So far, so good, but, there is a but ...
              If any of the policy listed devices, like these :

              d2451cd8-a6e7-432f-8dba-e4f3ca3666c0-image.png

              is asking for a DNS host name to be resolved, it will be done without any DNSBL filtering.
              Great.
              But the DNS resolver's answer will also be stored in the resolver (pfSense) cache also. That's what DNS is all about after all : for later identical requests, if the TTL is still non zero, the resolver can serve the answer right away.

              Here it comes : all you LAN devices that are not listed in the "Python Group Policy" will now also be served with an same answer, even if the host name was listed in a DNSBL list.
              DNSBL handling will 'prohibited' resolving, not from answering from the resolver cache.

              edit : Of course, I hope to be wrong here.
              This 'issue' is easy to test .... chances are great that I'm right.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • H
                Hyperion_Cyber
                last edited by

                Thank you all. I managed to solve this issue by adding IPs under the Python Group Policy.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.