• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Block Websites for some users, but not others.

pfBlockerNG
3
6
230
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    Hyperion_Cyber
    last edited by Mar 18, 2025, 1:46 AM

    Good day,

    I hope everyone is well. First off, apologies if this has been asked before.

    I want to block access to specific websites, while allowing a select few users to browse freely. I am new to pfsense and pfblockerng, and I would sincerely appreciate guidance on how I can accomplish this.

    Thank you in advance.

    S 1 Reply Last reply Mar 18, 2025, 3:01 AM Reply Quote 0
    • S
      SteveITS Galactic Empire @Hyperion_Cyber
      last edited by Mar 18, 2025, 3:01 AM

      @Hyperion_Cyber There is a “group policy” section in pfBlocker where you can allow IPs. I believe you must select Python mode to see it.

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      H 1 Reply Last reply Mar 18, 2025, 3:52 AM Reply Quote 0
      • H
        Hyperion_Cyber @SteveITS
        last edited by Mar 18, 2025, 3:52 AM

        @SteveITS Ok great! I found the group policy option. Do I need to do anything in port forwarding or firewall rules to ensure everything takes effect?

        S G 2 Replies Last reply Mar 18, 2025, 11:45 AM Reply Quote 0
        • S
          SteveITS Galactic Empire @Hyperion_Cyber
          last edited by Mar 18, 2025, 11:45 AM

          @Hyperion_Cyber Run an update in pfBlocker.

          In general devices need to use pfSense and not DOH/DOT for DNS, or they bypass blocking. pfBlocker has a checkbox in DNSBL to block that.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          1 Reply Last reply Reply Quote 0
          • G
            Gertjan @Hyperion_Cyber
            last edited by Gertjan Mar 18, 2025, 2:57 PM Mar 18, 2025, 2:56 PM

            @Hyperion_Cyber said in Block Websites for some users, but not others.:

            I found the group policy option

            Be aware :
            For all your LAN (multiple) devices, if a request host name is present in one of your DNSBL lists, it will get rejected (DNS/unbound/the resolver ) returns 0.0.0.0 (or 10.10.10.1).
            So far, so good, but, there is a but ...
            If any of the policy listed devices, like these :

            login-to-view

            is asking for a DNS host name to be resolved, it will be done without any DNSBL filtering.
            Great.
            But the DNS resolver's answer will also be stored in the resolver (pfSense) cache also. That's what DNS is all about after all : for later identical requests, if the TTL is still non zero, the resolver can serve the answer right away.

            Here it comes : all you LAN devices that are not listed in the "Python Group Policy" will now also be served with an same answer, even if the host name was listed in a DNSBL list.
            DNSBL handling will 'prohibited' resolving, not from answering from the resolver cache.

            edit : Of course, I hope to be wrong here.
            This 'issue' is easy to test .... chances are great that I'm right.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • H
              Hyperion_Cyber
              last edited by Mar 25, 2025, 12:45 AM

              Thank you all. I managed to solve this issue by adding IPs under the Python Group Policy.

              1 Reply Last reply Reply Quote 0
              3 out of 6
              • First post
                3/6
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.