Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall rules

    Scheduled Pinned Locked Moved Firewalling
    18 Posts 6 Posters 5.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      maverick_slo
      last edited by

      Hi guys!

      I don`t know where the problem is…
      I have 2 networks LAN and PUBLIC. LAN is 10.10.0.0/24 and PUBLIC is 172.16.16.0/24
      Check attached image...
      How the hell can someone from 172.16.16.XXX access my webserver on 10.10.0.XXX on port 80??!
      It is strictly blocked or am I doing it wrong?
      From public to LAN I allow only DNS and ping...
      Should I create rules differently?

      Thanks!
      firewall.png
      firewall.png_thumb

      1 Reply Last reply Reply Quote 0
      • L
        labasus
        last edited by

        You should use NAT port forwarding - http://doc.pfsense.org/index.php/Port_Forward_Troubleshooting

        1 Reply Last reply Reply Quote 0
        • K
          kathampy
          last edited by

          Your rules look badly designed and redundant. Only allow what you need and refrain from using * except for Internet access rules. Everything else gets blocked.

          1 Reply Last reply Reply Quote 0
          • M
            maverick_slo
            last edited by

            OK, so I have deleted redundant rules…
            But still...
            I want to DISallow 172.16.16.0/24 to access 10.10.0.0/24 except for DNS and ping.
            172.16.16.0/24 should have full internet access.

            So how do I do that?

            Now I allowed ping everywhere and DNS everywhere...
            I now need to allow internet access but I cannot allow port 80 on 10.10.0.0/24 network to be reached by 172.16.16.0/24 network.

            Thanks!

            firewall.JPG
            firewall.JPG_thumb

            1 Reply Last reply Reply Quote 0
            • K
              kathampy
              last edited by

              Don't set the source for rules on the PUBLIC interface. The rules already apply only to traffic coming in from the PUBLIC interface. Don't try to mix ICMP and DNS for LAN and Internet into one rule. It will become confusing later.

              Make the source * and set the destination to "LAN subnet" for the ICMP and DNS rules. This will explicitly allow ICMP and DNS from PUBLIC to LAN only.

              For Internet access on the PUBLIC interface, create a rule from * to "not LAN subnet". This will allow full Internet access from PUBLIC (including ICMP and DNS to Internet servers) but not allow any access to LAN.

              1 Reply Last reply Reply Quote 0
              • M
                maverick_slo
                last edited by

                OK, I have it like in attachment…

                I can access my lan on port 80 from 172.16.16.15 ?

                Again:
                LAN (10.10.0.0/24)
                PUBLIC (172.16.16.0/24)

                So, what now?
                I cannot add share, but I can access webserver?!

                firewall.JPG
                firewall.JPG_thumb
                firewall2.png
                firewall2.png_thumb

                1 Reply Last reply Reply Quote 0
                • K
                  kathampy
                  last edited by

                  There's some other problem. Enable logging on all the rules and see which rule is allowing the traffic to LAN on port 80.

                  1 Reply Last reply Reply Quote 0
                  • M
                    maverick_slo
                    last edited by

                    I did, this is output…

                    And other screenshot where I want to add share nad FW blocks access which is absolutely correct...

                    firewall2.png
                    firewall2.png_thumb
                    firewall.JPG
                    firewall.JPG_thumb

                    1 Reply Last reply Reply Quote 0
                    • K
                      kathampy
                      last edited by

                      Give the rules descriptions! And isolate the log entry where port 80 is allowed.

                      1 Reply Last reply Reply Quote 0
                      • M
                        maverick_slo
                        last edited by

                        I have to add log options to EVERY rule on ALL interfaces??

                        Strange is, when I accessed port 80 there was no firewall entry for this port?

                        1 Reply Last reply Reply Quote 0
                        • M
                          maverick_slo
                          last edited by

                          Ahhhhh ohhhh crap :)
                          Found reason…

                          I have HAVP antivirus package installed :)
                          That explains everything now, I disabled it and rules are working OK :)

                          1 Reply Last reply Reply Quote 0
                          • D
                            doktornotor Banned
                            last edited by

                            No matter how crappy the HAVP thing is… I'd still strongly recommend to clean up the rules mess, whole lot of good notes above, incl. the rules descriptions.

                            1 Reply Last reply Reply Quote 0
                            • M
                              maverick_slo
                              last edited by

                              Ummm this is my home network…

                              On public I have 4 rules and on lan I have 2 rules...

                              What mess do I have I don`t understand :)

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                "What mess do I have I don`t understand"

                                What is suppose to be the point of the 3rd allow rule for !lan net (not lan net) in your firewall pic http://forum.pfsense.org/index.php?action=dlattach;topic=65903.0;attach=35278

                                If that is on the wan (public) inteface.. Where else would the traffic be going?  It would seem to allow anything to hit the wan inteface since the destination would be the public (wan) interface IP.

                                If that is on your lan network.. Then none of them make any sense.

                                BTW are you natting..  You have a private IP on your wan (public) interface - so if your just wanting to control traffic on your internal network natting would not make any sense.  But this is default setup, so curious if you turned it off or not?

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                1 Reply Last reply Reply Quote 0
                                • M
                                  maverick_slo
                                  last edited by

                                  LOL, read again my friend…

                                  I have WAN - pppoe

                                  1. LAN: 10.10.0.0/24
                                  2. PUBLIC: 172.16.16.0/24

                                  PUBLIC is ment to be the second lan for guests and 3rd rule allows users on 172.16.16.0/24 to access everything BUT my LAN subnet which is private to me...
                                  PUBLIC is just a name I gave, maybe GUEST would be better to understand :)

                                  And BTW, on pfsense rules tab, WAN is NEVER marked as PUBLIC but always as WAN  8) , see screenshot again.

                                  As far as I`m concerned these rules make perfect sense, are not redundant etc...

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    kejianshi
                                    last edited by

                                    Rules make sense, but yeah - GUEST is less confusing.

                                    I could label my WAN as LAN and my LAN as WAN and all would work fine but it would confuse the hell out of everyone but me.

                                    Anyway - This is a language thing I think and you already seem to have figured that out.

                                    1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator
                                      last edited by

                                      Or how about Lan2? This makes it really clear its a "lan" interface ;)

                                      Public to me means INTERNET..  I would love to see a survey of network IT guys given the term public - is that a lan or wan type network and see what the responses are ;)

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        maverick_slo
                                        last edited by

                                        OK, I`m glad we solved it out :)

                                        I even renamed the damn thing haha :)

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.