Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Guest Wireless Subnet - Couple Issues

    Scheduled Pinned Locked Moved Captive Portal
    14 Posts 5 Posters 8.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eri--
      last edited by

      Depending on your needs there are multiple solutions here.
      You can just add a block rule to the ports used by the webConfigurator and that is fine.
      You can leave the ports open and pfSense will monitor the logins and if the failed limit is reached will block the ip, iirc for 24 hours.
      If you are using CP on LAN there is the default rule to allow access to the GUI which can be disabled under advanced system options.

      1 Reply Last reply Reply Quote 0
      • H
        hmeister
        last edited by

        @ermal:

        Depending on your needs there are multiple solutions here.
        You can just add a block rule to the ports used by the webConfigurator and that is fine.
        You can leave the ports open and pfSense will monitor the logins and if the failed limit is reached will block the ip, iirc for 24 hours.
        If you are using CP on LAN there is the default rule to allow access to the GUI which can be disabled under advanced system options.

        Ermal…
        Thanks for monitoring and the reply. Ok, I will check this out and setup a rule to block the port. Isn't the web interface going to be using port 8080 or 80?? I will find out... or to your point perhaps the challange response page is using a unique port number... I am using this on a guest wireless port with the "Any" rule and blocking LAN.

        H.

        Best Regards;
        H.

        1 Reply Last reply Reply Quote 0
        • H
          hmeister
          last edited by

          @ermal:

          Depending on your needs there are multiple solutions here.
          You can just add a block rule to the ports used by the webConfigurator and that is fine.
          You can leave the ports open and pfSense will monitor the logins and if the failed limit is reached will block the ip, iirc for 24 hours.
          If you are using CP on LAN there is the default rule to allow access to the GUI which can be disabled under advanced system options.

          Ermal…
          I looked yesterday trying to determine what ports are uesed by webConfigurator.
          I like to blocked ports idea but what ports does the webConfigurator use besides 80? I don't think I can block 80 as that will defeat the guest wireless setup... Does it use 8080? still looking...

          H.

          Best Regards;
          H.

          1 Reply Last reply Reply Quote 0
          • H
            hmeister
            last edited by

            Hello all….
            I found this on another thread - Port 10000.
            I am going to setup the rule and test...

            The rule that block access on TCP port 10000 to the LAN interface is moved to the top of the rules list so it will be proccessed first.This rule blocks access to the webmin interface on the servers on the subnet Backbone.

            H.

            UPDATE - This does not work either… I picked port 10000 off the logs and it is not what this needs...

            Best Regards;
            H.

            1 Reply Last reply Reply Quote 0
            • H
              hmeister
              last edited by

              UPDATE…

              I was able to set this block up using port 443 on the guestwireless services subnet...
              This is working as expected...

              Best Regards;
              H.

              1 Reply Last reply Reply Quote 0
              • H
                hmeister
                last edited by

                @wallabybob:

                Have you tried creating firewall rules to block access to pfSense from the wireless interface/subnet?

                Yes - that is in place and working - That rule is setup on the LAN tab…
                To your point that rule should be blocking the admin page however if I place the web gateway address on a wireless user the admin challenge/response page pops up.... It's like the blocking rule ignores the wireless gateway... Perhaps I can create a rule to block the gateway on the lan?
                Still working this issue...

                Thanks for the reply and I am still trying...

                H.

                Best Regards;
                H.

                1 Reply Last reply Reply Quote 0
                • H
                  hmeister
                  last edited by

                  @hmeister:

                  UPDATE…

                  I was able to set this block up using port 443 on the guestwireless services subnet...
                  This is working as expected...

                  This doesn't work as it blocks not only 443 on GuestWireless but all 443 (https) going out to WAN as well… ???

                  Best Regards;
                  H.

                  1 Reply Last reply Reply Quote 0
                  • W
                    wallabybob
                    last edited by

                    @hmeister:

                    @hmeister:

                    UPDATE…

                    I was able to set this block up using port 443 on the guestwireless services subnet...
                    This is working as expected...

                    This doesn't work as it blocks not only 443 on GuestWireless but all 443 (https) going out to WAN as well… ???

                    Your rule probably needs to be refined to block access to port 443 on pfSense (rather than '*'?).

                    1 Reply Last reply Reply Quote 0
                    • L
                      LostInIgnorance
                      last edited by

                      As said by wallabybob, just set up the rule to block port 443 with a destination of the firewall IP.  That's what I have done with my rules.

                      1 Reply Last reply Reply Quote 0
                      • H
                        hmeister
                        last edited by

                        Hi…

                        I am back on this thread - I had to troubleshoot a hardware issue unrelated to this.
                        Ok, I will look closer at the rule...

                        I will critique the setup again...

                        Thanks Lost, Wally & everyone for the response...

                        H.

                        Best Regards;
                        H.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.