Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Want to know about firewall/nat rules

    Scheduled Pinned Locked Moved Firewalling
    15 Posts 4 Posters 5.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GruensFroeschliG Offline
      GruensFroeschli
      last edited by

      Destination WAN-address means exactly that: when the destination is the IP of the WAN of pfSense (never going to happen, unless you want to access the webGUI via the WAN).

      Set the destionation to any (the internet is any, right?) and 192.168.5.1 will no longer be able to access the internet.

      We do what we must, because we can.

      Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

      1 Reply Last reply Reply Quote 0
      • C Offline
        covex
        last edited by

        ok, but it closed vpn too… how can i keep vpn and ftp inside vpn open?

        1 Reply Last reply Reply Quote 0
        • jahonixJ Offline
          jahonix
          last edited by

          Obviously, since you closed all ports for your .5.1 client.
          Open up the VPN ports and your host should be fine accessing a VPN. Remember to put the allow rule(s) above the block all rule (first come, first serve)!

          1 Reply Last reply Reply Quote 0
          • C Offline
            covex
            last edited by

            @jahonix:

            Obviously, since you closed all ports for your .5.1 client.
            Open up the VPN ports and your host should be fine accessing a VPN. Remember to put the allow rule(s) above the block all rule (first come, first serve)!

            what is "vpn ports"? as far as i know ipsec is riding on top of tcp and udp and not using ports.
            i have everything open on ipsec tab. should i open tcp/udp 500 port on lan? but this port is used only for isakmp negotiations and it is done by pfsense already. thanks!

            1 Reply Last reply Reply Quote 0
            • jahonixJ Offline
              jahonix
              last edited by

              You didn't tell us which VPN solution you are using alas I couldn't answer that question exactly.
              For IPsec you need pass rules for AH and ESP protocols, not ports.
              Further reading might start (but isn't limited to!  ;D) here:
              http://en.wikipedia.org/wiki/Ipsec

              1 Reply Last reply Reply Quote 0
              • C Offline
                covex
                last edited by

                ???
                i don't understand how ah and esp could be involved here? may be if i do this it'll clear some things

                vpn tunnel
                192.168.5.1 - > [pfsense] < –----(internet)------ > [pfsense] <- 192.168.1.129
                xp wrkstn        vpn server                                    vpn server    web/ftp server
                                          ipsec                                          ipsec

                what i wanna do is to close access to the internet for 192.168.5.1 but keep access to 192.168.1.129 open for this station.
                ipsec tab in rules is set to allow everything. closing everything for .5.1 on lan and then opening ah and esp wont do anything. WALL
                thanks!

                1 Reply Last reply Reply Quote 0
                • jahonixJ Offline
                  jahonix
                  last edited by

                  You are asking the wrong questions and only give hints in pieces.
                  We are not here to pull each and every useful piece of information out of you…
                  With 121 post as of today I don't consider you a newbie anymore needing to be spoon-fed.

                  @covex:

                  ok, but it closed vpn too… how can i keep vpn and ftp inside vpn open?

                  Your client .5.1 obviously needs access to client .1.129 for specific services.
                  The VPN tunnel should be completely transparent for this machine, shouldn't it?

                  Have you tried creating a rule for .5.1 to access the other IP and maybe limiting it to the respective services?

                  1 Reply Last reply Reply Quote 0
                  • GruensFroeschliG Offline
                    GruensFroeschli
                    last edited by

                    Did you read the link i posted in my first reply?
                    If you really want help you should provide all availlable information.
                    You didnt say anything about pfSense handling the VPN connection.
                    As you described it, it sounded as if the client behind pfSense initiated a VPN connection.

                    Anyway: Can you figure that if you want access over the VPN connection, that you need a rule to allow this access?
                    Just create a rule above your block rule that allows as destination the other side of your tunnel.

                    Alternatively you could change your existing block rule to: Destination: "NOT other_side_of_tunnel".

                    We do what we must, because we can.

                    Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                    1 Reply Last reply Reply Quote 0
                    • C Offline
                      covex
                      last edited by

                      crushed and destroyed  :-[
                      [b]GruensFroeschli i'll read your first post again  :(

                      thanks for your help guys!  :)

                      1 Reply Last reply Reply Quote 0
                      • GruensFroeschliG Offline
                        GruensFroeschli
                        last edited by

                        No need to be crushed and destroyed :)
                        Just read the availlable info more carefully ;)
                        If you have any questions just ask again.

                        We do what we must, because we can.

                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.