Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense 2 rc2 allow ping opt1 to opt2

    Scheduled Pinned Locked Moved Firewalling
    10 Posts 4 Posters 6.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K Offline
      kaniagandzowski
      last edited by

      Good morning, have a server configured with pfSense 2.0 rc2
      It 4 network adapter
      1 - WAN (Internet)
      2 - LAN (Local Area Network) 192.168.0.1
      3 - OPT1 (Multimedialna_PBP) 10.0.0.1
      4 - OPT2 (wifi) 192.168.11.1

      Now are, that lan, opt1 and opt2 can every subnet ping . example

      C:>ping 192.168.11.1

      Badanie 192.168.11.1 z użyciem 32 bajtów danych:

      Odpowiedź z 192.168.11.1: bajtów=32 czas<1 ms TTL=64

      Statystyka badania ping dla 192.168.11.1:
          Pakiety: Wysłane = 1, Odebrane = 1, Utracone = 0 (0% straty),
      Szacunkowy czas błądzenia pakietów w millisekundach:
          Minimum = 0 ms, Maksimum = 0 ms, Czas średni = 0 ms

      I don't known, Why! I can ping from opt1 to opt2 and back.

      I think this rules not permit ping from op1 to opt2 and back

      Port opt1 and opt2 are not same lan and not enabled bridge

      Sorry for my english


      1 Reply Last reply Reply Quote 0
      • L Offline
        LostInIgnorance
        last edited by

        Are you looking to block access of ping or allow?

        1 Reply Last reply Reply Quote 0
        • K Offline
          kaniagandzowski
          last edited by

          I want every packets blocking  between subnet op1 and opt2. Subnets opt1 and opt2 permit acces internet only.

          it's strange because at pfsense 1.2.3 it's working

          1 Reply Last reply Reply Quote 0
          • stephenw10S Offline
            stephenw10 Netgate Administrator
            last edited by

            At the moment your firewall rules are allowing traffic of any protocol to any destination. That includes ICMP to other local subnets.
            You need to alter them to allow only traffic you want.

            Steve

            1 Reply Last reply Reply Quote 0
            • K Offline
              kaniagandzowski
              last edited by

              ok, but

              examples for wifi rules.
              second rule block everything packets
              first allow only packets outcoming from opt2 (wifi)
              so I think rules block packet incoming from opt1 (Multimedialna_pbp) becouse packet from source 10.0.0.1 which fits for rules created at opt2 (rule blocking everything).

              I can create rule at opt1 (10.0.0.0) block destinaton packet to opt2 (192.168.11.0) and its work for me (not allow ping from opt1 to opt2)

              but I think is worst becouse when I have got many subnet, I will create many rules block other subnet.

              I don't know why second rule at opt2 everything do not block pakiet incoming/outcoming packet from interfaces opt2

              1 Reply Last reply Reply Quote 0
              • K Offline
                kaniagandzowski
                last edited by

                How do I create rule allow only public internet example for opt 2 and opt1

                1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  Here is what have done for internet access only:

                  I created an alias for all my local subnets called LOCAL. For that is 192.168.0.0/16 but you can add whatever subnets you have.

                  Then I create a firewall rule to allow any traffic that has destination NOT LOCAL. I also add rule allow access to port 53 on the adapter address so that DNS forwarding still works.

                  Steve

                  wifirules.jpg
                  wifirules.jpg_thumb

                  1 Reply Last reply Reply Quote 0
                  • P Offline
                    pear
                    last edited by

                    same problem…

                    maximal unsecure, if i forgot add network to exclude of network destinations traffic run through :-(

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      The default behavior of LAN is to allow all traffic to any destination. This allows for ease of setup for a simple wan LAN install.
                      The default behavior of any additional interfaces is block everything. If you add interfaces you must configure your firewall rules to suit your network.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • P Offline
                        pear
                        last edited by

                        ok, it is fine if you have one LAN
                        but with multi LAN i find this setup not very good :-(
                        because it is necessary to think after adding new network to aliases and create new rule to block traffic between LANs

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.