Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    WebConfigurator

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 4 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ? This user is from outside of this forum
      Guest
      last edited by

      Is it possible disable the webConfigurator on the WAN interface? If so, what steps are needed to complete this. I do wish to keep it open on the LAN interface.

      1 Reply Last reply Reply Quote 0
      • J Offline
        jaspras
        last edited by

        For the LAN side you dont have to do anything there is a default anti-lokout rule on the LAN rules list.. Right on top.

        For the WAN side add a rule to Block or Drop any connections to port 80 / port 22 if you also need to drop SSH connections…

        put the rule right on top... of your WAN rules list

        1 Reply Last reply Reply Quote 0
        • P Offline
          phil.davis
          last edited by

          And by default all incoming connection attempts on WAN are blocked anyway. If your Firewall Rules WAN tab is empty, then there is no webConfigurator access from WAN side.

          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

          1 Reply Last reply Reply Quote 0
          • 2 Offline
            2chemlud Banned
            last edited by

            Phil, enter into your browser

            https://YOUR.pfsense.WAN.IP

            from the LAN or OPT1 or whatever… ;-)

            1 Reply Last reply Reply Quote 0
            • P Offline
              phil.davis
              last edited by

              That is accessing the WAN IP from the LAN network. That works because the firewall rule/s on LAN allow everything. Ordinary rules in pfSense are processed on the interface on which the initiating traffic arrives. The LAN rule lets LAN users go to anywhere, e.g. HTTPS port on any public IP, and if that public IP is yours or someone else's it makes no difference to pfSense.

              But you cannot access anything by starting a connection from the WAN side (out on the big bad internet).

              If you want to stop the LAN side clients from accessing the webGUI then you have to put some appropriate blocking rules in place on LAN - remembering to block access to destination webGUI on all interfaces.

              As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
              If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

              1 Reply Last reply Reply Quote 0
              • 2 Offline
                2chemlud Banned
                last edited by

                To me this "feature" is absolutely counter-intuitive. If you want to block access to the pfsense from a local net, e.g. OPT1 or LAN, completely, I guess lots of people miss this point. It should be locked from the very beginning (GUI not listening on the WAN IP until further notice).

                1 Reply Last reply Reply Quote 0
                • P Offline
                  phil.davis
                  last edited by

                  @2chemlud:

                  To me this "feature" is absolutely counter-intuitive. If you want to block access to the pfsense from a local net, e.g. OPT1 or LAN, completely, I guess lots of people miss this point. It should be locked from the very beginning (GUI not listening on the WAN IP until further notice).

                  Yeh, there has been discussion about this before.
                  People might try:

                  1. Add a separate management OPT1 interface with pass all.
                  2. On the workplace LAN delete the anti-lockout rule, put a block rule at the top that blocks anything to destination LAN IP (thus blocking webGUI, SSH…)
                  3. Have effectively pass all on LAN after that

                  They think they have blocked webGUI access from LAN, but actually LAN users can get to webGUI on WAN IP or OPT1 IP.

                  In pfSense 2.2. there is "This Firewall (self)" that can be used in rules (e.g. as destination for a block). Using that will block out all webGUI access to all interfaces.

                  As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                  If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.