Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New to pfsense and issues already

    General pfSense Questions
    9
    43
    8.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      charliem
      last edited by

      Another option is to eliminate your other router and use pfSense instead.

      If your router is a combination unit and you need to keep the switch ports and/or wireless functions, that's easy to do:  Just disable the DHCP server on your old router and plug one of its LAN ports into the LAN nic on your pfSense machine.  Set up pfSense with your WAN and you're good to go.

      1 Reply Last reply Reply Quote 0
      • K
        kurtis318
        last edited by

        I don't quite understand surely I should have router –----> pfsense WAN --------> pfsense LAN ------> Server ?

        But do I need some forwarding or rules to be added im in the dark here?

        1 Reply Last reply Reply Quote 0
        • M
          muswellhillbilly
          last edited by

          Two questions here: can you ping the internal ip of the firewall from your internal network? Let's establish first whether the issue is internal or within the firewall rules. Assuming this works and you can access the web gui, move onto the next step:

          Can you post a screen shot of two particular pages? The first one is found under the Firewall/NAT menu. Select the 'Outbound' tab and post a screenshot of this page. Next, select the Firewall/Rules menu item, click on the 'LAN' tab and post a second screenshot of this page. Finally, click on the 'WAN' tab on the same section (Firewall/Rules) and take a screenshot of this page.

          1 Reply Last reply Reply Quote 0
          • K
            kurtis318
            last edited by

            I am able to ping the firewall from the server and access the web UI from it to I have added the requested images I have checked my system log which shows activity from the router its the rules/bridging in between




            1 Reply Last reply Reply Quote 0
            • M
              muswellhillbilly
              last edited by

              The default deny rule is working correctly - the last screenshot you posted shows external addresses trying to hit your external IP, which is correctly blocking the traffic.

              Another test: Try pinging an external address from your LAN PC, such as 8.8.8.8. Do you get a response? Check your default route out on the WAN side (menu item: System/Routing and select the 'gateways' tab. Can you send a screenshot of this page also?

              Last thought: Does your internal PC have the correct DNS settings? Without a valid DNS server in your network settings you won't be able to resolve internet names, which could also be creating the problem you're having.

              1 Reply Last reply Reply Quote 0
              • C
                charliem
                last edited by

                @kurtis318:

                I don't quite understand surely I should have router –----> pfsense WAN --------> pfsense LAN ------> Server ?

                Normally pfSense gets WAN directly, via cable modem, dsl modem, etc., and then you hang everything else (switches, wireless access points, PC clients, … ) off of the pfSense LAN port.  pfSense is the router; if you have another router in front of pfSense, it's best to put it into 'bridge' mode.

                What type of internet connection do you have?  And what is your 'router' (brand & model)?

                1 Reply Last reply Reply Quote 0
                • K
                  kurtis318
                  last edited by

                  Its a business connection with Zen and the router is a vigor 2710

                  1 Reply Last reply Reply Quote 0
                  • K
                    kurtis318
                    last edited by

                    Ok I am able to ping 8.8.8.8 and Im able to view sites

                    1 Reply Last reply Reply Quote 0
                    • K
                      kurtis318
                      last edited by

                      I dont want to block the external traffic thats the data I want to recieve

                      @muswellhillbilly:

                      The default deny rule is working correctly - the last screenshot you posted shows external addresses trying to hit your external IP, which is correctly blocking the traffic.

                      Another test: Try pinging an external address from your LAN PC, such as 8.8.8.8. Do you get a response? Check your default route out on the WAN side (menu item: System/Routing and select the 'gateways' tab. Can you send a screenshot of this page also?

                      Last thought: Does your internal PC have the correct DNS settings? Without a valid DNS server in your network settings you won't be able to resolve internet names, which could also be creating the problem you're having.

                      1 Reply Last reply Reply Quote 0
                      • M
                        muswellhillbilly
                        last edited by

                        Ok, if the ping works, then your firewall/router are both working correctly and the issue is almost certainly DNS. If you're using a Windows PC open a command prompt and type "nslookup www.google.com 8.8.8.8". If you get a non-authoritative answer back then you just have to add 8.8.8.8 as a DNS server in your PC's network settings.

                        Alternately, you could set up DHCP on your firewall to assign addresses internally. (Services/DHCP Server + LAN tab). Create a valid internal range and include a public DNS server(s) in the settings. You can try 8.8.8.8 for a start, as it's a public DNS server anyone can use.

                        1 Reply Last reply Reply Quote 0
                        • M
                          muswellhillbilly
                          last edited by

                          @kurtis318:

                          I dont want to block the external traffic thats the data I want to recieve

                          The external traffic being blocked is traffic which is originating from the internet, not your internal network. This is normal behaviour for any firewall - you don't want anyone externally to access your firewall from outside unless you have services that you want external audiences to see, which I don't believe you do. So long as the request originates from inside your LAN, traffic will be allowed back in. It's just the traffic coming unannounced from outside that's being stopped.

                          1 Reply Last reply Reply Quote 0
                          • K
                            kurtis318
                            last edited by

                            This server is used for receiving remote CCTV video alarms so I am expecting the majority of traffic to come externally

                            1 Reply Last reply Reply Quote 0
                            • M
                              muswellhillbilly
                              last edited by

                              Ok, so you'll need to make sure you know the following information:

                              1. Does the traffic from those remote CCTV alarms originate from the remote addresses of the alarms or is the traffic initiated from the internal PC?

                              2. If the above answer is 'traffic originates remotely' then what are the external IP addresses of the remote CCTV alarms?

                              3. What is the tcp (udp?) port that your internal PC is using to allow connection from those remote alarms? (this has to be visible from the outside)

                              If you can pass on the above info, I should be able to tell you what to do to allow access to your PC from those remote sites.

                              1 Reply Last reply Reply Quote 0
                              • K
                                kurtis318
                                last edited by

                                Ok this could be tricky

                                There are over 200 remote sites each with static external ip's

                                tcp ports that need to be open are 25, 8005, 3389, 1025, 1237, 10000, 2000, 1024, 80

                                up until recently we blocked all traffic unless recieved on those ports via the router in built software and had filter rules to block ip's that were spamming us I run out of available rules hence the need for pfsense

                                Many thanks for your input so far

                                1 Reply Last reply Reply Quote 0
                                • P
                                  phil.davis
                                  last edited by

                                  I guess that the front-end router has been setup to port forward all incoming traffic on its public WAN to the pfSense WAN at 192.168.1.10 - since that outside traffic has found its way to pfSense WAN and been blocked and logged.

                                  Now you need to add port forward/s and rules to allow the traffic you want and forward it to that server on LAN.

                                  Firewall->Aliases

                                  1. make an alias with the 200 static public IP addresses that you expect traffic from
                                  2. Make an alias with the list of destination ports you want to allow traffic to reach
                                    Firewall->NAT Port Forward
                                  3. Add a port forward, click the "Advanced" button for Source. Select type "Single host or alias". Start typing the alias name of the 200 addresses - the full name will appear.
                                  4. Leave source port range "any"
                                  5. Destination should be WANaddress
                                  6. Destination port range - use the port alias you made
                                  7. Redirect target IP - address of the server on LAN
                                  8. Redirect target port - use the port alias again
                                  9. Leave "Add associated filter rule" selected at the bottom
                                    Save it.
                                    That should redirect all the stuff you want into your server. The associated filter rule should allow it to pass.
                                    All other traffic on WAN is blocked, so rubbish from unknown places will simply be blocked. You can choose whether to log it or just ignore it.

                                  As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                  If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    muswellhillbilly
                                    last edited by

                                    Sorry - had to leave and only just got back to this post. Thanks, Phil - you pretty much summed up what I was going to say. The main brunt of the work will be entering all 200 addresses into the alias you'll need to set up the rule, otherwise the rest of the process should be fairly quick and painless. As Phil says, if your outside router has been set up to forward all incoming traffice regardless of port - or you've set your router to run in bridged mode - then you should be good to go.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      biggsy
                                      last edited by

                                      @muswellhillbilly:

                                      The main brunt of the work will be entering all 200 addresses into the alias you'll need to set up the rule

                                      You can copy and paste a list, one IP address per line, straight into the IP address field on the add alias screen.  It will throw a big red error but will also add each IP to a separate entry - no description though.  Just save.

                                      Of course, you need to have compiled the list to start  :)

                                      1 Reply Last reply Reply Quote 0
                                      • DerelictD
                                        Derelict LAYER 8 Netgate
                                        last edited by

                                        You can also load url contents into an alias.

                                        There is also the bulk import button on the aliases page.

                                        ![Screen Shot 2014-11-27 at 2.37.20 AM.png](/public/imported_attachments/1/Screen Shot 2014-11-27 at 2.37.20 AM.png)
                                        ![Screen Shot 2014-11-27 at 2.37.20 AM.png_thumb](/public/imported_attachments/1/Screen Shot 2014-11-27 at 2.37.20 AM.png_thumb)
                                        ![Screen Shot 2014-11-27 at 2.37.40 AM.png](/public/imported_attachments/1/Screen Shot 2014-11-27 at 2.37.40 AM.png)
                                        ![Screen Shot 2014-11-27 at 2.37.40 AM.png_thumb](/public/imported_attachments/1/Screen Shot 2014-11-27 at 2.37.40 AM.png_thumb)

                                        Chattanooga, Tennessee, USA
                                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                        1 Reply Last reply Reply Quote 0
                                        • K
                                          kurtis318
                                          last edited by

                                          Ive just had a look at the list and there are a number of host names rather then addresses how would I over come this?

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Use the URLs tab instead of IP to import the list as an alias.

                                            Steve

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.