Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall rules

    Scheduled Pinned Locked Moved Firewalling
    18 Posts 6 Posters 5.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kathampy
      last edited by

      Don't set the source for rules on the PUBLIC interface. The rules already apply only to traffic coming in from the PUBLIC interface. Don't try to mix ICMP and DNS for LAN and Internet into one rule. It will become confusing later.

      Make the source * and set the destination to "LAN subnet" for the ICMP and DNS rules. This will explicitly allow ICMP and DNS from PUBLIC to LAN only.

      For Internet access on the PUBLIC interface, create a rule from * to "not LAN subnet". This will allow full Internet access from PUBLIC (including ICMP and DNS to Internet servers) but not allow any access to LAN.

      1 Reply Last reply Reply Quote 0
      • M
        maverick_slo
        last edited by

        OK, I have it like in attachment…

        I can access my lan on port 80 from 172.16.16.15 ?

        Again:
        LAN (10.10.0.0/24)
        PUBLIC (172.16.16.0/24)

        So, what now?
        I cannot add share, but I can access webserver?!

        firewall.JPG
        firewall.JPG_thumb
        firewall2.png
        firewall2.png_thumb

        1 Reply Last reply Reply Quote 0
        • K
          kathampy
          last edited by

          There's some other problem. Enable logging on all the rules and see which rule is allowing the traffic to LAN on port 80.

          1 Reply Last reply Reply Quote 0
          • M
            maverick_slo
            last edited by

            I did, this is output…

            And other screenshot where I want to add share nad FW blocks access which is absolutely correct...

            firewall2.png
            firewall2.png_thumb
            firewall.JPG
            firewall.JPG_thumb

            1 Reply Last reply Reply Quote 0
            • K
              kathampy
              last edited by

              Give the rules descriptions! And isolate the log entry where port 80 is allowed.

              1 Reply Last reply Reply Quote 0
              • M
                maverick_slo
                last edited by

                I have to add log options to EVERY rule on ALL interfaces??

                Strange is, when I accessed port 80 there was no firewall entry for this port?

                1 Reply Last reply Reply Quote 0
                • M
                  maverick_slo
                  last edited by

                  Ahhhhh ohhhh crap :)
                  Found reason…

                  I have HAVP antivirus package installed :)
                  That explains everything now, I disabled it and rules are working OK :)

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    No matter how crappy the HAVP thing is… I'd still strongly recommend to clean up the rules mess, whole lot of good notes above, incl. the rules descriptions.

                    1 Reply Last reply Reply Quote 0
                    • M
                      maverick_slo
                      last edited by

                      Ummm this is my home network…

                      On public I have 4 rules and on lan I have 2 rules...

                      What mess do I have I don`t understand :)

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        "What mess do I have I don`t understand"

                        What is suppose to be the point of the 3rd allow rule for !lan net (not lan net) in your firewall pic http://forum.pfsense.org/index.php?action=dlattach;topic=65903.0;attach=35278

                        If that is on the wan (public) inteface.. Where else would the traffic be going?  It would seem to allow anything to hit the wan inteface since the destination would be the public (wan) interface IP.

                        If that is on your lan network.. Then none of them make any sense.

                        BTW are you natting..  You have a private IP on your wan (public) interface - so if your just wanting to control traffic on your internal network natting would not make any sense.  But this is default setup, so curious if you turned it off or not?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • M
                          maverick_slo
                          last edited by

                          LOL, read again my friend…

                          I have WAN - pppoe

                          1. LAN: 10.10.0.0/24
                          2. PUBLIC: 172.16.16.0/24

                          PUBLIC is ment to be the second lan for guests and 3rd rule allows users on 172.16.16.0/24 to access everything BUT my LAN subnet which is private to me...
                          PUBLIC is just a name I gave, maybe GUEST would be better to understand :)

                          And BTW, on pfsense rules tab, WAN is NEVER marked as PUBLIC but always as WAN  8) , see screenshot again.

                          As far as I`m concerned these rules make perfect sense, are not redundant etc...

                          1 Reply Last reply Reply Quote 0
                          • K
                            kejianshi
                            last edited by

                            Rules make sense, but yeah - GUEST is less confusing.

                            I could label my WAN as LAN and my LAN as WAN and all would work fine but it would confuse the hell out of everyone but me.

                            Anyway - This is a language thing I think and you already seem to have figured that out.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              Or how about Lan2? This makes it really clear its a "lan" interface ;)

                              Public to me means INTERNET..  I would love to see a survey of network IT guys given the term public - is that a lan or wan type network and see what the responses are ;)

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              1 Reply Last reply Reply Quote 0
                              • M
                                maverick_slo
                                last edited by

                                OK, I`m glad we solved it out :)

                                I even renamed the damn thing haha :)

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.