Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    AI Copilot get a tip! Is it a safe and good practise?

    Scheduled Pinned Locked Moved NAT
    6 Posts 2 Posters 681 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      Antibiotic
      last edited by Antibiotic

      Hi, Gopilot get a tip to optimize settings. He suggest make a NAT rule on WAN and VPN interfaces "DO NOT NAT" from SOURCE: LOCAL and VPN subnets to DESTINATION: the same subnets. I s it good and safe? him arguments were about avoid mistake for local samba dlna and etc. VPN as clients on pfSense. Should everything to work with this rules? for example limiters?

      pfSense plus 25.07.1 on Topton mini PC
      CPU: Intel N100
      NIC: Intel i-226v 4 pcs
      RAM : 16 GB DDR5
      Disk: 128 GB NVMe
      Brgds, Archi

      1 Reply Last reply Reply Quote 0
      • jimpJ Offline
        jimp Rebel Alliance Developer Netgate
        last edited by

        No, it is not a good tip. Those things rarely are.

        That adds no security. If you tell it not to NAT, the traffic still exist, it could still be misrouted or picked up by bad actors upstream. If you're lucky the ISP might drop that traffic but in practice ISPs are not as good with egress filtering as they should be.

        If leaking traffic concerns you, block it with firewall rules. For example, floating rule to block quick outbound to those destinations on all WAN(s).

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        A 2 Replies Last reply Reply Quote 0
        • A Offline
          Antibiotic @jimp
          last edited by

          @jimp Thank's i will not to try this)))

          pfSense plus 25.07.1 on Topton mini PC
          CPU: Intel N100
          NIC: Intel i-226v 4 pcs
          RAM : 16 GB DDR5
          Disk: 128 GB NVMe
          Brgds, Archi

          1 Reply Last reply Reply Quote 0
          • A Offline
            Antibiotic @jimp
            last edited by Antibiotic

            @jimp One more question, i have read this netgate docs: https://docs.netgate.com/pfsense/en/latest/recipes/rfc1918-egress.html. I f i do this rule and use vpn client with ip 10.0.2.1 . iS THIS RULE WILL BREAK SOMETHING FOR VPN CLIENT?mY PFsESNE BOX IS FIRST, NO ANY UPSTREAM AFTER HIM, ONLY BEHIND?

            pfSense plus 25.07.1 on Topton mini PC
            CPU: Intel N100
            NIC: Intel i-226v 4 pcs
            RAM : 16 GB DDR5
            Disk: 128 GB NVMe
            Brgds, Archi

            1 Reply Last reply Reply Quote 0
            • jimpJ Offline
              jimp Rebel Alliance Developer Netgate
              last edited by

              The rules in that example only affect WANs, not VPN interfaces. If the VPN client is running on a client device then all the firewall sees is the public traffic, not private. If it's a VPN defined on pfSense software and the rules are only on WAN interfaces then it's the same thing, more or less.

              The only way that would affect VPN traffic is if you also setup that rule to block on VPN interfaces on pfSense, which isn't what it's suggesting.

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              A 1 Reply Last reply Reply Quote 0
              • A Offline
                Antibiotic @jimp
                last edited by

                @jimp Ok , thanks)))

                pfSense plus 25.07.1 on Topton mini PC
                CPU: Intel N100
                NIC: Intel i-226v 4 pcs
                RAM : 16 GB DDR5
                Disk: 128 GB NVMe
                Brgds, Archi

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.