Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Simple rule is not working

    Scheduled Pinned Locked Moved Firewalling
    15 Posts 4 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      doktornotor Banned
      last edited by

      ROFL. www.yandex.ru sure like hell does NOT use a single IP. Won't work. Unless you can work out the entire ASN in use, you need some DNS override or proxy.

      This is what I get here ATM:

      
      Non-authoritative answer:
      Name:    www.yandex.ru
      Addresses:  2a02:6b8::3
               213.180.204.3
               213.180.193.3
               93.158.134.3
      
      
      1 Reply Last reply Reply Quote 0
      • I
        ikshpre
        last edited by

        Sory, i should add this to my first message. I tested access to yandex exactly by ip 213.180.204.3, but not by url. Need to block this ip.

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by

          Sigh. You CANNOT block Yandex by blocking a single IP.

          1 Reply Last reply Reply Quote 0
          • I
            ikshpre
            last edited by

            I do not need to block yandex. I need to block 1 ip address.

            1 Reply Last reply Reply Quote 0
            • D
              doktornotor Banned
              last edited by

              Sigh. Maybe post some real example of what does not work and logs showing how it does not work. Not going to waste more time with "examples" that plain cannot ever work due to reasons already explained repeatedly.

              1 Reply Last reply Reply Quote 0
              • M
                mer
                last edited by

                It sounds like the user on host 192.168.1.205 is browsing to www.yandex.ru, not browsing to 213.180.204.3.  As already stated, the DNS lookup is resolving to something different thatn 213.180.204.3 so your rule doesn't work.  That's why it was suggested to do some DNS proxy/override;  that would force www.yandex.ru to resolve to a single IP, then you could write a rule for that.

                At least that's what I believe doktornotor is trying to say (if I'm wrong, please correct me).

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  Yeah, exactly. Blocking the single IP is totally useless.

                  1 Reply Last reply Reply Quote 0
                  • I
                    ikshpre
                    last edited by

                    @doktornotor:

                    Yeah, exactly. Blocking the single IP is totally useless.

                    Ok. I will ask another way.
                    There is a web site with some ip adress. One user open it via this ip adress. Can i block this ip adress to prevent user watch it with my example on attached screens?

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Clearly he doesn't get it..  Look at his last rule, dest 127.0.0.1  How these people have admin to firewalls in the first place is just beyond me..

                      Look I get back 3 IPs when I query that, and the ttl is 300 seconds.  So those could change every 5 minutes, etc..  As dok has been trying to tell you.. You can not just block that single IP.  You need to block ALL the ips that site might resolve too.  And btw it sure is not going to be on UDP..

                      If you are actually testing to that 1 IP and its still working then you have not cleared your states.. So create rule, log said rule, and then test.. Clicky Click blocked traffic..

                      multipleips.png
                      multipleips.png_thumb
                      blocked.png
                      blocked.png_thumb

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        Well, that 127.0.0.1 NAT rule is a workaround for NUT idiocy.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          What traffic would ever hit his lan interface with dest loopback?? That rule is not linked to a port forward, and the rule above it any any should allow any such traffic, etc.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • D
                            doktornotor Banned
                            last edited by

                            @johnpoz:

                            What traffic would ever hit his lan interface with dest loopback??

                            It's a NATed rule on LAN. (LAN interface IP -> localhost).

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              That rule is not a NAT rule..  Its on the LAN interface.. it is not linked to a NAT, and the NAT if in place would be allowed by the any any rule he has..

                              The thread you linked too stated
                              "You can add a port forward for TCP port 3493 on the interface of your choice (lan, wan, etc) to localhost:3493 and regain remote access."

                              He is not showing his port forward page he is showing his lan interface..  The firewall rule is not linked and pointless because the any any rule would allow the nat.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • D
                                doktornotor Banned
                                last edited by

                                This debate is rather off-topic. Please, see the NAT prefix in the rule name. And yes, of course it is on LAN inteface. You don't share UPS over WAN on sane setups. This is the only way to use NUT as remote networked UPS, due to retarded upstream. I am using the very same thing myself. Without NAT, you get no access to the UPS. The daemon binds to localhost ONLY.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.