• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Allow Any Any question regarding guest network

Firewalling
5
27
461
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W
    wgstarks
    last edited by Apr 9, 2025, 12:14 AM

    Current rules for guest-

    login-to-view

    I know the Allow Any Any is evaluated last but I don't remember creating it and not sure if it's right. Shouldn't it be a Block Any Any?

    Box: SG-4200

    S 1 Reply Last reply Apr 9, 2025, 1:37 AM Reply Quote 0
    • S
      SteveITS Galactic Empire @wgstarks
      last edited by SteveITS Apr 9, 2025, 1:37 AM Apr 9, 2025, 1:37 AM

      @wgstarks What are you trying to accomplish/allow/block on this network?

      Edit: only LAN has a default allow all rule.

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote ๐Ÿ‘ helpful posts!

      1 Reply Last reply Reply Quote 0
      • W
        wgstarks
        last edited by Apr 9, 2025, 1:45 AM

        I honestly donโ€™t remember creating that rule. I was adding a rule to allow home assistant access to the guest network from its IP on LAN when I noticed the rule in question. Iโ€™m really not sure why this rule is needed or if itโ€™s even a good idea?

        Box: SG-4200

        S G 2 Replies Last reply Apr 9, 2025, 2:12 AM Reply Quote 0
        • S
          SteveITS Galactic Empire @wgstarks
          last edited by Apr 9, 2025, 2:12 AM

          @wgstarks well without it 10.1.0.23 can get to anything (thatโ€™s this subnet right?) and things can ping, and nothing else would be allowed.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote ๐Ÿ‘ helpful posts!

          1 Reply Last reply Reply Quote 0
          • W
            wgstarks
            last edited by Apr 9, 2025, 2:32 AM

            I get that but should the guest network have an allow all rule? This opens the guest network to all traffic from WAN right?

            Box: SG-4200

            S 1 Reply Last reply Apr 9, 2025, 4:43 AM Reply Quote 0
            • S
              SteveITS Galactic Empire @wgstarks
              last edited by Apr 9, 2025, 4:43 AM

              @wgstarks Rules apply as traffic enters an interface. Source: VLAN, dest any. Even if it doesnโ€™t say it, traffic only arrives on this VLAN.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote ๐Ÿ‘ helpful posts!

              W 1 Reply Last reply Apr 9, 2025, 9:44 AM Reply Quote 0
              • W
                wgstarks @SteveITS
                last edited by Apr 9, 2025, 9:44 AM

                @SteveITS
                Thanks

                Box: SG-4200

                1 Reply Last reply Reply Quote 0
                • G
                  Gertjan @wgstarks
                  last edited by Gertjan 30 days ago 30 days ago

                  @wgstarks said in Allow Any Any question regarding guest network:

                  I honestly donโ€™t remember creating that rule.

                  edit the rule, and go to the bottom of the page.

                  login-to-view

                  Last decade or so, this info wasn't there.
                  Is your pfSense that old ?

                  @wgstarks said in Allow Any Any question regarding guest network:

                  Shouldn't it be a Block Any Any?

                  Easy to fact check : delete all rules on an interface. All of them.
                  Now, connect a device and see what you can do - can access out of your own local network : not much. Like : nothing.
                  One upvote for you if you can tell us what still works without any GUI firewall rules ๐Ÿ˜Š ๐Ÿ‘

                  The thing is : the default behavior of 'pf', that's the firewall used by pfSense, is : "block" so there is no real need to place a block rule at the bottom position in the GUI as the very last 'pf' rule will be 'block all' anyway.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  W 1 Reply Last reply 30 days ago Reply Quote 0
                  • W
                    wgstarks @Gertjan
                    last edited by 30 days ago

                    @Gertjan
                    It appears it was created by me a little over 7 years ago. No surprise I donโ€™t remember. Sometimes I have a hard time remembering last week.๐Ÿ˜

                    I tested connections to other networks last night after reading @SteveITS post. You are both correct that any attempts to connect to other networks are all blocked.

                    Iโ€™m still not sure that the allow any any rule serves a purpose though? Wondering if it should be deleted? If Iโ€™m understanding correctly it will allow machines on LAN to connect to machines on the guest network. Wouldnโ€™t it be better to block by default and set specific allow rules for circumstances where connections are needed?

                    Box: SG-4200

                    G S 2 Replies Last reply 30 days ago Reply Quote 0
                    • G
                      Gertjan @wgstarks
                      last edited by Gertjan 30 days ago 30 days ago

                      @wgstarks said in Allow Any Any question regarding guest network:

                      Iโ€™m still not sure that the allow any any rule serves a purpose though?

                      Actually, I'm only using the Any rule : see the mast two rules here :

                      login-to-view

                      as I'm the one paying for the connection, I'm not going to block myself ๐Ÿ˜Š

                      The Source will always be a device on that network - and not some other network, so Source is defined, in my case "LAN subnets" and not an 'Any' - it couldn't be Any anyway.

                      Works fine for me ยฉ

                      edit : sure, typical Guest networks should contain some limitations, as
                      Guests ... tend to go anywhere.
                      You .... the one paying, can wind up in court as you are responsible for your connection ( which you shouldn't share with non trusted users as this is probably mentioned your ISP usage agreement ).

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • S
                        SteveITS Galactic Empire @wgstarks
                        last edited by 30 days ago

                        @wgstarks said in Allow Any Any question regarding guest network:

                        Wouldnโ€™t it be better to block by default and set specific allow rules

                        That is how pfSense and most firewalls work. That's why I asked, "What are you trying to accomplish/allow/block on this network?"

                        LAN by default allows to any.

                        All other interfaces in pfSense have only the default deny rule and zero additional rules. So you should ask yourself questions like:

                        • do these PCs (this network) need DNS from pfSense?
                        • should these PCs be able to ping pfSense?
                        • do these PCs need to get to other local networks?
                        • do these PCs need to get to the Internet?
                        • etc.

                        Then create your rules as for what you want them to access.

                        Since it is labeled as a "guest" network this might be helpful: https://docs.netgate.com/pfsense/en/latest/solutions/netgate-4200/opt-lan.html#isolated

                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                        Upvote ๐Ÿ‘ helpful posts!

                        G 1 Reply Last reply 30 days ago Reply Quote 0
                        • JKnottJ
                          JKnott
                          last edited by 30 days ago

                          Here are my guest rules:

                          login-to-view

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          • G
                            Gertjan @SteveITS
                            last edited by 30 days ago

                            @SteveITS said in Allow Any Any question regarding guest network:

                            That is how pfSense and most firewalls work. That's why I asked, "What are you trying to accomplish/allow/block on this network?"

                            LAN by default allows to any.

                            Thanks ... it came just now to my mind that I misread the initial post/question.

                            The pfSense LAN is meant to be used for the trusted devices, like the admin access, and so on.
                            The default LAN rules are pass-all.
                            All others - let's say less trusted users - should go on another interface.

                            I've such an interface, network : my captive portal used for a hotel :

                            login-to-view

                            and I use pfBlockerng to block the most obvious "no-no-don't go" hosts.

                            login-to-view

                            and all these :

                            login-to-view

                            and

                            login-to-view

                            Don't ask why I add "Astrology", I'm not sure what it is ^^

                            The first list, as I'm a hotel, isn't really important ๐Ÿ˜Š
                            Activating it also demands way more RAM as what my 4100 has.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            1 Reply Last reply Reply Quote 0
                            • W
                              wgstarks
                              last edited by wgstarks 30 days ago 30 days ago

                              This is just a network for visitors to my house and a few IoT devices. They only need access to DHCP, DNS, NTP perhaps (all provided by the firewall) and the internet. Home Assistant needs access to some of the IoT devices so I have created a pass rule from the HA device on LAN to the Guest network. None of the devices on Guest should have access to LAN or any other local networks and I donโ€™t really see a reason to allow access from local networks to the guest network other than the specific instance mentioned. Am I missing something?

                              Box: SG-4200

                              S 1 Reply Last reply 30 days ago Reply Quote 0
                              • S
                                SteveITS Galactic Empire @wgstarks
                                last edited by 30 days ago

                                @wgstarks Ok so:

                                • block what you want to block
                                • allow any will let devices on this subnet get to the Internet

                                Did you ever say what 10.1.0.23 is? If that's not an IP on this guest network the rule is pointless since traffic will never arrive on this interface from an IP that isn't behind this interface. Note it shows 0/0 so has never been triggered/matched.

                                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                Upvote ๐Ÿ‘ helpful posts!

                                W 1 Reply Last reply 30 days ago Reply Quote 0
                                • W
                                  wgstarks @SteveITS
                                  last edited by wgstarks 30 days ago 30 days ago

                                  @SteveITS said in [Allow Any Any question regarding guest network]

                                  Did you ever say what 10.1.0.23 is? If that's not an IP on this guest network the rule is pointless since traffic will never arrive on this interface from an IP that isn't behind this interface. Note it shows 0/0 so has never been triggered/matched.

                                  10.0.1.23 is the LAN address for Home Assistant. Obviously I have not set this rule up correctly. How should I setup a rule to allow this LAN address to connect to the Guest network?

                                  Box: SG-4200

                                  S 1 Reply Last reply 30 days ago Reply Quote 0
                                  • S
                                    SteveITS Galactic Empire @wgstarks
                                    last edited by 30 days ago

                                    @wgstarks said in Allow Any Any question regarding guest network:

                                    How should I setup a rule to allow this LAN address to connect to the Guest network?

                                    You would need to create it on LAN.

                                    Though if LAN still has its "allow to any" rule then another one for this IP is not actually necessary.

                                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                    Upvote ๐Ÿ‘ helpful posts!

                                    1 Reply Last reply Reply Quote 0
                                    • the otherT
                                      the other
                                      last edited by the other 30 days ago 30 days ago

                                      hey there,
                                      I solved this by adding a rule like "reject / guest_network / RFC1918 (alias)".
                                      Followed by "pass guest_network / any / Port collection to allow https, android playstore, mail..." the typical "can I use your internet for a moment?" moments...

                                      My IoT stuff has its own subnet, here only home assistant is granted internet access (updates), the rest ("smart TV, IoT devices) are ususally blocked. Once every few months I allow that for updates.

                                      In case you want ALL LAN clients to reach guest...stick with it. Otherwise define your rules more specific. :)

                                      the other

                                      pure amateur home user, no business or professional background
                                      please excuse poor english skills and typpoz :)

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        wgstarks
                                        last edited by 28 days ago

                                        I removed the allow any rule from the guest network but now that network no longer has access to WAN. What ALLOW rules do I need to add to give users on this network access to WAN, DHCP, DNS, NTP?

                                        Box: SG-4200

                                        S 1 Reply Last reply 28 days ago Reply Quote 0
                                        • S
                                          SteveITS Galactic Empire @wgstarks
                                          last edited by SteveITS 28 days ago 28 days ago

                                          @wgstarks So to be clear you want VLAN1003_GUEST to access the WAN network but not the Internet?

                                          I would start by just writing down what you want them to access, and where it is. Then the rules are apparent.

                                          If you are using pfSense for DHCP, pfSense automatically adds rules on an interface so DHCP works, when DHCP server is enabled. So in that one case you don't need a rule.

                                          If you are using pfSense for DNS then you need a rule to allow VLAN1003_GUEST Networks to "VLAN1003_GUEST Address" on pfSense, port 53, TCP/UDP.

                                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                          Upvote ๐Ÿ‘ helpful posts!

                                          1 Reply Last reply Reply Quote 0
                                          2 out of 27
                                          • First post
                                            2/27
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.