• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Allow Any Any question regarding guest network

Firewalling
5
27
472
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    JKnott
    last edited by Apr 9, 2025, 2:22 PM

    Here are my guest rules:

    login-to-view

    PfSense running on Qotom mini PC
    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
    UniFi AC-Lite access point

    I haven't lost my mind. It's around here...somewhere...

    1 Reply Last reply Reply Quote 0
    • G
      Gertjan @SteveITS
      last edited by Apr 9, 2025, 2:38 PM

      @SteveITS said in Allow Any Any question regarding guest network:

      That is how pfSense and most firewalls work. That's why I asked, "What are you trying to accomplish/allow/block on this network?"

      LAN by default allows to any.

      Thanks ... it came just now to my mind that I misread the initial post/question.

      The pfSense LAN is meant to be used for the trusted devices, like the admin access, and so on.
      The default LAN rules are pass-all.
      All others - let's say less trusted users - should go on another interface.

      I've such an interface, network : my captive portal used for a hotel :

      login-to-view

      and I use pfBlockerng to block the most obvious "no-no-don't go" hosts.

      login-to-view

      and all these :

      login-to-view

      and

      login-to-view

      Don't ask why I add "Astrology", I'm not sure what it is ^^

      The first list, as I'm a hotel, isn't really important ๐Ÿ˜Š
      Activating it also demands way more RAM as what my 4100 has.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      1 Reply Last reply Reply Quote 0
      • W
        wgstarks
        last edited by wgstarks Apr 9, 2025, 2:52 PM Apr 9, 2025, 2:50 PM

        This is just a network for visitors to my house and a few IoT devices. They only need access to DHCP, DNS, NTP perhaps (all provided by the firewall) and the internet. Home Assistant needs access to some of the IoT devices so I have created a pass rule from the HA device on LAN to the Guest network. None of the devices on Guest should have access to LAN or any other local networks and I donโ€™t really see a reason to allow access from local networks to the guest network other than the specific instance mentioned. Am I missing something?

        Box: SG-4200

        S 1 Reply Last reply Apr 9, 2025, 4:31 PM Reply Quote 0
        • S
          SteveITS Galactic Empire @wgstarks
          last edited by Apr 9, 2025, 4:31 PM

          @wgstarks Ok so:

          • block what you want to block
          • allow any will let devices on this subnet get to the Internet

          Did you ever say what 10.1.0.23 is? If that's not an IP on this guest network the rule is pointless since traffic will never arrive on this interface from an IP that isn't behind this interface. Note it shows 0/0 so has never been triggered/matched.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote ๐Ÿ‘ helpful posts!

          W 1 Reply Last reply Apr 9, 2025, 5:01 PM Reply Quote 0
          • W
            wgstarks @SteveITS
            last edited by wgstarks Apr 9, 2025, 5:01 PM Apr 9, 2025, 5:01 PM

            @SteveITS said in [Allow Any Any question regarding guest network]

            Did you ever say what 10.1.0.23 is? If that's not an IP on this guest network the rule is pointless since traffic will never arrive on this interface from an IP that isn't behind this interface. Note it shows 0/0 so has never been triggered/matched.

            10.0.1.23 is the LAN address for Home Assistant. Obviously I have not set this rule up correctly. How should I setup a rule to allow this LAN address to connect to the Guest network?

            Box: SG-4200

            S 1 Reply Last reply Apr 9, 2025, 5:11 PM Reply Quote 0
            • S
              SteveITS Galactic Empire @wgstarks
              last edited by Apr 9, 2025, 5:11 PM

              @wgstarks said in Allow Any Any question regarding guest network:

              How should I setup a rule to allow this LAN address to connect to the Guest network?

              You would need to create it on LAN.

              Though if LAN still has its "allow to any" rule then another one for this IP is not actually necessary.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote ๐Ÿ‘ helpful posts!

              1 Reply Last reply Reply Quote 0
              • T
                the other
                last edited by the other Apr 9, 2025, 5:31 PM Apr 9, 2025, 5:31 PM

                hey there,
                I solved this by adding a rule like "reject / guest_network / RFC1918 (alias)".
                Followed by "pass guest_network / any / Port collection to allow https, android playstore, mail..." the typical "can I use your internet for a moment?" moments...

                My IoT stuff has its own subnet, here only home assistant is granted internet access (updates), the rest ("smart TV, IoT devices) are ususally blocked. Once every few months I allow that for updates.

                In case you want ALL LAN clients to reach guest...stick with it. Otherwise define your rules more specific. :)

                the other

                pure amateur home user, no business or professional background
                please excuse poor english skills and typpoz :)

                1 Reply Last reply Reply Quote 0
                • W
                  wgstarks
                  last edited by Apr 11, 2025, 3:06 PM

                  I removed the allow any rule from the guest network but now that network no longer has access to WAN. What ALLOW rules do I need to add to give users on this network access to WAN, DHCP, DNS, NTP?

                  Box: SG-4200

                  S 1 Reply Last reply Apr 11, 2025, 4:30 PM Reply Quote 0
                  • S
                    SteveITS Galactic Empire @wgstarks
                    last edited by SteveITS Apr 11, 2025, 4:32 PM Apr 11, 2025, 4:30 PM

                    @wgstarks So to be clear you want VLAN1003_GUEST to access the WAN network but not the Internet?

                    I would start by just writing down what you want them to access, and where it is. Then the rules are apparent.

                    If you are using pfSense for DHCP, pfSense automatically adds rules on an interface so DHCP works, when DHCP server is enabled. So in that one case you don't need a rule.

                    If you are using pfSense for DNS then you need a rule to allow VLAN1003_GUEST Networks to "VLAN1003_GUEST Address" on pfSense, port 53, TCP/UDP.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote ๐Ÿ‘ helpful posts!

                    1 Reply Last reply Reply Quote 0
                    • W
                      wgstarks
                      last edited by Apr 11, 2025, 7:48 PM

                      I want anyone using the guest network to be able to access the internet. I thought that that would be the same as WAN but allowing access to WAN didnโ€™t work.

                      Do I also need to create a rule to allow access to NTP provided by pfsense?

                      Box: SG-4200

                      S 1 Reply Last reply Apr 11, 2025, 8:26 PM Reply Quote 0
                      • S
                        SteveITS Galactic Empire @wgstarks
                        last edited by Apr 11, 2025, 8:26 PM

                        @wgstarks "WAN network" is the network of the pfSense WAN interface. the /29 or /24 or whatever it is.

                        Since you don't know what IPs they will access out in the world, it's normal to allow access to "any." So:

                        • allow what you want to allow (e.g. guest to VLAN1003_GUEST Address for DNS, NTP)
                        • block what you want to block (e.g. guest to This Firewall, guest to LAN)
                        • allow to any

                        The rules are processed in order top down.

                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                        Upvote ๐Ÿ‘ helpful posts!

                        W 1 Reply Last reply Apr 11, 2025, 9:42 PM Reply Quote 0
                        • W
                          wgstarks @SteveITS
                          last edited by Apr 11, 2025, 9:42 PM

                          @SteveITS
                          Block rules on top right and then the pass rules?

                          Box: SG-4200

                          S 1 Reply Last reply Apr 11, 2025, 11:13 PM Reply Quote 0
                          • S
                            SteveITS Galactic Empire @wgstarks
                            last edited by Apr 11, 2025, 11:13 PM

                            @wgstarks I don't know, it depends.

                            https://docs.netgate.com/pfsense/en/latest/solutions/netgate-4200/opt-lan.html#apply-changes

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote ๐Ÿ‘ helpful posts!

                            W 1 Reply Last reply Apr 12, 2025, 12:45 AM Reply Quote 1
                            • W
                              wgstarks @SteveITS
                              last edited by Apr 12, 2025, 12:45 AM

                              @SteveITS
                              Thanks for all your help. I think I've finally gotten, or at least I'm getting close.

                              Here is the current rules-
                              login-to-view

                              I used the LOCAL_SUBNETS alias because I already had it setup. I think it's the same as RFC 1918-
                              login-to-view

                              If you see any problems or anything I've missed please let me know.

                              Box: SG-4200

                              G 1 Reply Last reply Apr 14, 2025, 7:14 AM Reply Quote 1
                              • G
                                Gertjan @wgstarks
                                last edited by Apr 14, 2025, 7:14 AM

                                @wgstarks

                                Suggestion : like your first rule : local (VLAN1003_GUEST) devices are allowed to use the local (pfSense) DNS.
                                You could add also NTP (port 123 UDP) so devices can use pfSense to sync their time, if they want to.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                W 1 Reply Last reply Apr 14, 2025, 12:47 PM Reply Quote 1
                                • W
                                  wgstarks @Gertjan
                                  last edited by Apr 14, 2025, 12:47 PM

                                  @Gertjan
                                  Done thanks. ๐Ÿ‘

                                  Box: SG-4200

                                  1 Reply Last reply Reply Quote 0
                                  21 out of 27
                                  • First post
                                    21/27
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.