Clean Install with pfsense 2.0 using transparent firewall
-
If it worked before then either you weren't using your entire /22 on both interfaces or it was set up as a transparent firewall. You really need to find out how it used to be set up so that we can help you duplicate the configuration.
-
we were using the entire /22 on both interfaces, infact both cards had the same IP's as they have now.
but I think it was working as transparent firewallps. on a quest for the truth I have found this http://pfsense.trendchiller.com/transparent_firewall.pdf
Followed all the steps but no I can't connect pfsense to network because is working hour…so I can't test it now -
It does sound like it was set as a transparent firewall before, that's the only way that would have worked.
Do please be aware that that guide you linked to is for a pre-release of V1.0 of pfSense. Things have changed significantly since and following it blindly may cause you major problems.
-
@Cry:
It does sound like it was set as a transparent firewall before, that's the only way that would have worked.
Do please be aware that that guide you linked to is for a pre-release of V1.0 of pfSense. Things have changed significantly since and following it blindly may cause you major problems.
I found it at the support page, yes things have change but I can't find a newer one. Hope I did the settings correct.
-
Is it possible to recover the configuration file from the system that broke?
-
:( unfortunately no because the system disk crashed
@Cry Havok is there a practical guide in order to do the firewall transparent??? and where ? -
I assume you've already checked the pfSense documentation? I'd expect that the pfSense book covers it, but otherwise I don't know.
-
Even if your configuration is correct it is not going to be able to do much that is useful while
@verylife78:Wan card is sis0 and is LINK DONW state.
. . .
I tried to connect with the router with normal UTP cable and with an crossover, nothing worked on both cases. (no trafic from pfsense to internet, neither from pc to internet).Is your WAN link still down? Maybe the pfSense WAN interface or the corresponding Cisco interface or the cable between them is broken.
It's a public network so nothing can be change.
The 10.x.x.x addresses are PRIVATE addresses as far as the Internet is concerned. Maybe that makes a difference in respect to what can be changed.
-
@wallabybob
You went way back…. with the quote reply
WAN card is not at DOWN state since I follow the instructions for the transparent firewall
I said public network, maybe I misused the word "public". I know this address 10.xxx.xxx.xxx are private, but we are using this range in the government (public) buildings
I have attached the start page in order to understand.
Now the only cable that is connected is the one at LAN card, but I have followed the instructions in order to setup the transparent firewall.
Hope I made my self clear and sorry for any language mistakes, my native language is Greek.
Waiting for an answer.
-
I said public network, maybe I misused the word "public". I know this address 10.xxx.xxx.xxx are private, but we are using this range in the government (public) buildings
It is important to get public/private distinction clear when it comes to deciding how to set the per-interface settings of Block private networks (e.g. Interfaces -> LAN, scroll down to private networks). I presume you have it unchecked. But can you explain why the firewall is blocking the LAN traffic shown in the screen capture of the previous reply?
Hope I made my self clear and sorry for any language mistakes, my native language is Greek.
Your english is way better than my Greek :)
-
I assume it was this guide that you followed?
http://pfsense.trendchiller.com/transparent_firewall.pdfLooking at your screen grab I see that your firewall is blocking traffic on LAN all of which is coming from a different subnet. If you have only the default LAN allow rule you will have to edit it or add more rules to allow traffic from a different subnet.
What is working at the moment?
Steve
-
at the moment because we are depending 100% from the web I can't do any tests
But last night (now it's morning time) when I plugin the pfsense box, NOTHING pass through, all the internet activity was blocked. But from my pc when I ping the router(gateway) at 10.169.92.1 it reply back, but when I enter a url address at the browser, the page is not loading. Also the network icon (Win7) it has a yellow triangle, no internet connection.
Probably some firewall rules block everything.
First I need to allow everything in order to work, and then I could start blocking.
When I check at the logs everything is blocked.
The action that triggered the block action is
1. @1 scrub in on xl0 all fragment reassemble
2. @1 block drop in log all label "Default deny rule"
Which is the default deny rule that applies always?
I am attaching 2 images from the rules at WAN and LAN card. One I added my self from the logs
-
Please try disabling the 2 blocking rules.
-
@Cry:
Please try disabling the 2 blocking rules.
Do those blocking rules come from enabling Block private networks on the corresponding interface?
-
@CryHavok which 2 blocking do I have to disable?
@wallabybob block private networks is Disable on both LAN and WAN interfaces, because my network is 10.xxx.xxx.xxx, but block bogon networks is Enable.
thanks for the help people. My organization, if the firewall works, will not spend 8.500 euro for a firewall appliance. -
You only have 2 blocking rules - the ones with the red boxes next to them.
-
If you're having bogon network both sides, isn't that against block bogon rules like Cry Havok is trying to say. ???
-
Recently I read news that all IPv4 addresses had been allocated to regional NICs. That would seem to mean that there are no bogon networks. This suggests that "block bogon networks" might be in untested territory. (I'm not familiar with the internals of the firewall. In a firewall rule "empty set" might have the same representation as "don't care" which, in the displayed rules, would end up blocking everything.)
I suggest you also disable the Block bogon networks and see what happens to your firewall rules, traffic and firewall logs. You will probably also need to reset the firewall states to make sure the rule changes take effect.
-
The (as tracked by Team Cymru) bogon list still contains a number of IP ranges, so it isn't empty:
0.0.0.0 255.0.0.0
10.0.0.0 255.0.0.0
127.0.0.0 255.0.0.0
169.254.0.0 255.255.0.0
172.16.0.0 255.240.0.0
192.0.0.0 255.255.255.0
192.0.2.0 255.255.255.0
192.168.0.0 255.255.0.0
198.18.0.0 255.254.0.0
198.51.100.0 255.255.255.0
203.0.113.0 255.255.255.0
224.0.0.0 224.0.0.0 -
Interesting. Seems bogon is not well defined. Wikipedia says (in http://en.wikipedia.org/wiki/Bogon_filtering) Bogons are not the same as reserved private address ranges, such as 10.x.x.x and 192.168.x.x, which are reserved for private networks.[1]).
How does pfSense define bogons?