Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Another Plea for Rules Help!

    Firewalling
    4
    8
    866
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      Overcon
      last edited by

      Sorry to toss this out on an apparently consistent topic of help, but I cannot, for the life of me, figure out how to get PFSENSE to allow inbound rules to work.

      I have read and followed steps and nothing.

      First off, a little info on the system. It's an older 1U server with two NIC's. Ones the WAN, ones the LAN. I have internet access and am able to surf just fine.

      I am trying to do two things. The first is set the firewall to allow ICMP Pings from ANY.

      I created a rule that was specific in what source network I wanted the ping to be allowed and all that and nothing so then I created a rule to allow it all and then once I determined that worked, lock it down, well I can't even get the allow all rule to work. So here is the rule as it is now, trying to get pings allowed from anywhere:

      I am not seeing any blocks on the firewall.

      The second thing I am trying to do is setup remote admin through HTTPS on a specific port other than 443. Once again, I started specific and then expanded it to ANY because it didn't work, same results as the ping, I cannot get anything from external to access the PFSENSE box.

      For the admin access to the GUI I put:

      PASS
      WAN
      IPv4
      TCP
      ANY (Source)
      WAN (DESTINATION) Though I have tried specific IP, ANY et cetera
      PORT (Specific and default)

      Nothing. I have tried resetting states and no go.

      Anyone got some ideas on what to do? What to check? Anything :)

      1 Reply Last reply Reply Quote 0
      • O
        Overcon
        last edited by

        It also seems that no rule works unless it impacts the LAN network only.

        1 Reply Last reply Reply Quote 0
        • KOMK
          KOM
          last edited by

          You firewall rules image seems to be missing.  Just to be clear, what are you trying to remote manage via 443, your pfSense install or something behind it like a web server?

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            Pings are not TCP, they are ICMP.  If you want your WAN address pingable from anywhere do this on WAN.

            Restricting it to echoreq only is probably not necessary but…

            WAN-Ping.png
            WAN-Ping.png_thumb

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              And you sure  pfsense is not behind a double nat?  Ie does pfsense have public ip on its wan or is an rfc1918 address?  I see this all the time - why doesn't my port forward work, etc..  Because pfsense is never seeing the traffic to forward because the NAT in front of it didn't send the traffic to pfsense.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • O
                Overcon
                last edited by

                Well I am as positive as I can be that it is not behind another NAT device or a firewall. This is a DSL line from Windstream (our local POS Internet provider) and the modem was put into Passthrough mode, which basically just allows everything to pass through and the devices behind it are allowed to restrict what they like.

                We use this for our NCIC Criminal records check, but there are 5 IP's assigned to the DSL line so the NCIC firewall (a Juniper Firewall / VPN device) is using one of the IP's to do it's thing. I then took another IP and used it for this PFsense firewall and assigned it another IP et cetera.

                I can reach the Juniper devices interface so I assume that the DSL modem is not interrupting traffic.

                I did set the rule up to allow ICMP for the pings and it made no difference.

                I am trying to setup the WAN interface to allow for remote management of the GUI when I am at home or in other offices. So the rule would be toned down and restricted to certain IP's once I get it to work, but currently I cannot get ANY rule to apply to the WAN interface.

                I am not sure why the image didn't link, maybe it doesn't like linking to Google Docs.

                I'll see if a link directly to it works, but as I mentioned before, nothing I apply to it seems to work and I don't know why, I have used PFSense before and I don't recall this issue. I suppose I can change the WAN IP to an Internal one and see if I can access it from an internal intranet Ip to rule out blocking from the DSL modem.

                It just seems like this should be the easiest part of the setup is allowing access to the WAN interface when there is no NAT or port forwarding or anything involved, just rules as far as I recall.

                Here is the rule I created to allow ICMP:

                https://drive.google.com/file/d/0BzsKCe89Gscxdy1yR0VPQ2RZNWc/view?usp=sharing

                1 Reply Last reply Reply Quote 0
                • O
                  Overcon
                  last edited by

                  I also tried this way:

                  https://drive.google.com/file/d/0BzsKCe89GscxeWN6dDhZdk1TeWc/view?usp=sharing

                  1 Reply Last reply Reply Quote 0
                  • O
                    Overcon
                    last edited by

                    Bah, never mind! Sorry to have wasted anyone's time.

                    Apparently the IT yahoo's at the main courthouse (who don't know squat but actually try and run stuff) are apparently blocking connections going out somehow, probably because they have the stupid firewall they use incorrectly configured.

                    I was able to RDP into my system at home and then test pings and remote administration and it works fine, so it's definitely something the yahoo's here are blocking or otherwise configuring it. I knew those rules were right, I was just too anxious to leave for my three day weekend, I didn't think of other ways to test remotely. I was thinking I could just test from my office PC, which is a different connection and try, not thinking they have something interrupting outbound stuff.

                    Thanks for the help!

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.