• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

PfBlockerNG

pfBlockerNG
210
1.2k
1.8m
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    samham
    last edited by Feb 7, 2015, 4:22 PM

    I have configured iBlock list under IPv4 to block in both directions I see the logs showing blocking however no updates for the widget, please see attached

    pfNG.PNG
    pfNG2.PNG
    pfNG.PNG_thumb
    pfNG2.PNG_thumb

    1 Reply Last reply Reply Quote 0
    • B
      BBcan177 Moderator
      last edited by Feb 7, 2015, 4:26 PM

      @samham:

      I have configured iBlock list under IPv4 to block in both directions I see the logs showing blocking however no updates for the widget, please see attached

      When you look at the System Logs: Firewall Logs in the GUI. Do these alerts have pfB_ in the Rule Column?

      "Experience is something you don't get until just after you need it."

      Website: http://pfBlockerNG.com
      Twitter: @BBcan177  #pfBlockerNG
      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

      1 Reply Last reply Reply Quote 0
      • S
        samham
        last edited by Feb 7, 2015, 4:32 PM

        no I don't but i see the IP being blocked in both the pfblockerNG:Alerts and the Firewall Log

        log1.PNG
        log2.PNG
        log1.PNG_thumb
        log2.PNG_thumb

        1 Reply Last reply Reply Quote 0
        • B
          BBcan177 Moderator
          last edited by Feb 7, 2015, 4:43 PM

          Clear the Firewall Log and start fresh. When you make Rule Changes, they can go out of Sync.

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          1 Reply Last reply Reply Quote 0
          • B
            BBcan177 Moderator
            last edited by Feb 7, 2015, 4:51 PM

            @samham:

            how do you show Rule column under system:firewall log?

            System Logs: Settings:

            Filter Descriptions and select "Display as Column"

            Also make sure the logs are in reverse. First Checkbox at the top of the Settings page.

            "Experience is something you don't get until just after you need it."

            Website: http://pfBlockerNG.com
            Twitter: @BBcan177  #pfBlockerNG
            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

            1 Reply Last reply Reply Quote 0
            • S
              samham
              last edited by Feb 7, 2015, 4:51 PM

              I still don't see the pfB_in under rules

              1 Reply Last reply Reply Quote 0
              • S
                samham
                last edited by Feb 7, 2015, 4:57 PM

                OK I see it now, but still no update in widget

                pfNG3.PNG
                pfNG3.PNG_thumb

                1 Reply Last reply Reply Quote 0
                • B
                  BBcan177 Moderator
                  last edited by Feb 7, 2015, 5:22 PM Feb 7, 2015, 5:18 PM

                  @samham:

                  OK I see it now, but still no update in widget

                  Did you manually edit the pfBlockerNG Descriptions in the rules? the rules are auto-generated and need to start with "pfB_"

                  You should not need to edit the Descriptions as this will affect how the Widget reads the log files.

                  Edit:
                  If you uses "Alias" Type rules: make sure the Rule Description starts with  "pfb_" Lowercase..

                  There is a whole tech section in the IPv4/Alias tab, to describe how to do this.

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  1 Reply Last reply Reply Quote 0
                  • S
                    samham
                    last edited by Feb 7, 2015, 5:58 PM Feb 7, 2015, 5:23 PM

                    not for the auto rule under the WAN interface, but for the manually added rule under the LAN I did add a description as by default it is blank.

                    update…

                    I deleted the manual rule and created an auto rule, now it works fine. thanks BBcan177 for a great package, what is the account to donate?

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by Feb 7, 2015, 7:28 PM

                      Manual rules are just fine as long as you RTFM and set the descriptions as required. The widget lacks paranormal skills, cannot match the hits unless the rules description is set properly.

                      1 Reply Last reply Reply Quote 0
                      • T
                        Topper727
                        last edited by Feb 7, 2015, 7:37 PM

                        I will be on that list to want to see it and test it bbcan..

                        Dell 2950 g3 server
                        Intel(R) Xeon(R) CPU E5430 @ 2.66GHz
                        Current: 2000 MHz, Max: 2667 MHz
                        8 CPUs: 2 package(s) x 4 core(s)
                        8152 MiB and 600meg 10k drive
                        Pfsense 2.4 .. Hoping to get the phpvirtualbox going again.

                        1 Reply Last reply Reply Quote 0
                        • W
                          wcrowder
                          last edited by Feb 7, 2015, 8:27 PM Feb 7, 2015, 8:20 PM

                          I have to agree with doktornotor, most of the problems I'm seeing reported here could have been avoided by reading the instructions on each page. BB' worked hard to explain everything either above or below each choice. Example: "Headers" are required.

                          The 'Header' Field must be Unique

                          IE. A Blank "Header field" is not unique.

                          Read each page carefully and it will work. :)

                          1 Reply Last reply Reply Quote 0
                          • B
                            BBcan177 Moderator
                            last edited by Feb 7, 2015, 9:24 PM

                            @samham:

                            thanks BBcan177 for a great package, what is the account to donate?

                            You can send a paypal to my email account, which is listed in the General Tab of pfBNG. I will put this towards v2.0 Development!  :)

                            "Experience is something you don't get until just after you need it."

                            Website: http://pfBlockerNG.com
                            Twitter: @BBcan177  #pfBlockerNG
                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                            1 Reply Last reply Reply Quote 0
                            • C
                              Cino
                              last edited by Feb 7, 2015, 10:38 PM

                              @wcrowder:

                              I have to agree with doktornotor, most of the problems I'm seeing reported here could have been avoided by reading the instructions on each page. BB' worked hard to explain everything either above or below each choice. Example: "Headers" are required.

                              The 'Header' Field must be Unique

                              IE. A Blank "Header field" is not unique.

                              Read each page carefully and it will work. :)

                              I totally agree with your both!!

                              Like I tell my privates, read the f$cking FM! And in the case of pfBlockerNG, the directions are there on every page.

                              Maybe the package needs a warning: for advanced and/or IT users only =D

                              1 Reply Last reply Reply Quote 0
                              • ?
                                A Former User
                                last edited by Feb 8, 2015, 1:41 AM

                                As a person who is regularly caught explaining "in plain English" IT terminology, I see the problem somewhere else, and I'll play the devil's advocate here.

                                Someone has to bridge the engineer > user gap. I'm regularly caught in all three sides (including the middle-man), and I see the problem from every possible angle.

                                An example:
                                Engineer's thought process:
                                sudo apt-get update && sudo apt-get upgrade && sudo apt-get dist-upgrade
                                (if you know that && means execute the following command when the previous one ends)

                                User's thought process:
                                upgrade system next

                                Having to set up aliases is not the point here. It's actually having to set up aliases that's the problem  ;)

                                The engineer knows that in order to get to the next version, the system has to first know about that version (update), bring the system up to the last upgradable point before the actual jump to the next version to reduce the possibility of things going south (upgrade), then make the jump (dist-upgrade).

                                The user wants to upgrade the system and doesn't care about the process behind it.

                                Trust me, works a lot better when IT is cut out of the discussion. Think accounting. I don't actually care about the process to get to a result, as long as I get a result. Although I personally find it fascinating knowing how things work, not everyone does ;-)

                                Not saying any side is wrong btw, just laying out my thoughts for both sides to consider. group hug

                                1 Reply Last reply Reply Quote 0
                                • D
                                  doktornotor Banned
                                  last edited by Feb 8, 2015, 7:23 AM

                                  @jflsakfja:

                                  As a person who is regularly caught explaining "in plain English" IT terminology, I see the problem somewhere else, and I'll play the devil's advocate here.

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    Topper727
                                    last edited by Feb 8, 2015, 9:14 AM

                                    Add them in the IPv4 tab like shown in picture below my post

                                    ![screencapture-192-168-1-1-pkg_edit-php (2).png](/public/imported_attachments/1/screencapture-192-168-1-1-pkg_edit-php (2).png)
                                    ![screencapture-192-168-1-1-pkg_edit-php (2).png_thumb](/public/imported_attachments/1/screencapture-192-168-1-1-pkg_edit-php (2).png_thumb)

                                    Dell 2950 g3 server
                                    Intel(R) Xeon(R) CPU E5430 @ 2.66GHz
                                    Current: 2000 MHz, Max: 2667 MHz
                                    8 CPUs: 2 package(s) x 4 core(s)
                                    8152 MiB and 600meg 10k drive
                                    Pfsense 2.4 .. Hoping to get the phpvirtualbox going again.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      bfeitell
                                      last edited by Feb 8, 2015, 9:46 AM

                                      I have been using pfblockerNG for a few days now (v1.03), and I have been seeing extremely long boot times.  The system hangs at configuring firewall for about 13 minutes before finally continuing and bringing up the system.  I was able to ssh into the system, and it shows almost zero load with ~16 processes including top, until my ssh session freezes when the boot process completes.

                                      This is very similar to the massive delay seen when trying to use the original pfblocker under pfSense 2.2.

                                      I am using just the country block lists, and I am blocking all unsolicited inbound traffic from all the nations listed, except mine.

                                      The behavior is very strange in that the system just seems to be idling, before it finally unsticks and completes the boot process.

                                      Cheers,
                                      Bennett

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        Supermule Banned
                                        last edited by Feb 8, 2015, 9:48 AM

                                        Are you blocking the package repository from pfsense?

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          doktornotor Banned
                                          last edited by Feb 8, 2015, 11:17 AM Feb 8, 2015, 11:12 AM

                                          @bfeitell:

                                          I am using just the country block lists, and I am blocking all unsolicited inbound traffic from all the nations listed, except mine.

                                          Ugh. Yeah, so you are having aliases with billions of IPs for absolutely NO valid reason, since all those are already blocked by default deny, just without this huge overhead.. And wondering why it's slow and takes ages to configure the rules? Sigh.  :( :'(

                                          Lets try again:

                                          @BBcan177:

                                          pfSense is a stateful firewall by design. By default all Inbound is set to Deny (implicit).

                                          So the only reasons to have Deny Inbound or Deny Both, is if you have Open ports that you would like to protect. Most often a "Deny Outbound" is sufficient. If you wish to log activity that is hitting your firewall then you can set "Deny Both". This is a generalization. You need to think about your needs in your network first.

                                          1 Reply Last reply Reply Quote 0
                                          280 out of 1196
                                          • First post
                                            280/1196
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.