Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Separate Network

    Scheduled Pinned Locked Moved Routing and Multi WAN
    25 Posts 6 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD Offline
      Derelict LAYER 8 Netgate
      last edited by

      Something like this on your OPT1 interface.

      ow-rules.png_thumb
      ow-rules.png

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • D Offline
        ditrone
        last edited by

        looked in firewall rules for opt1 and i see *
        I added a block rule above that for all IPv4 + 6 traffic

        • Source *  Port    Destination LAN net  * Port * Gateway.
          i'll report test results
        1 Reply Last reply Reply Quote 0
        • jahonixJ Offline
          jahonix
          last edited by

          You pretty much nailed it.
          Not as granular as Derelict showed but does exactly what you want.

          1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator
            last edited by

            So Derelict curious are you running local networks that are not rfc1918?  Curious on the reject to rfc1918 as well as local networks?  I see no point in that 2nd rule unless your running non rfc1918 locally?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

            1 Reply Last reply Reply Quote 0
            • DerelictD Offline
              Derelict LAYER 8 Netgate
              last edited by

              Sometimes.  It is redundant in many cases.  For most simply blocking RFC1918 is probably all they need to do and it would be set and forget.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • D Offline
                ditrone
                last edited by

                another beginner problem.  I'm still able to acess the pfsense web login at 192.168.0.1 (opt1 network).  i'm sure there is a setting in pfsense to block this.

                and i did read this.

                https://doc.pfsense.org/index.php/Restrict_access_to_management_interface

                can this be made simpler?

                clients on ap's on switch connected to opt1 need to be able to access captive portal.

                1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  And lets see your rules.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                  1 Reply Last reply Reply Quote 0
                  • D Offline
                    ditrone
                    last edited by

                    @johnpoz:

                    And lets see your rules.

                    attached

                    ![Screenshot - 06062015 - 12:30:52 PM.png_thumb](/public/imported_attachments/1/Screenshot - 06062015 - 12:30:52 PM.png_thumb)
                    ![Screenshot - 06062015 - 12:29:59 PM.png_thumb](/public/imported_attachments/1/Screenshot - 06062015 - 12:29:59 PM.png_thumb)
                    ![Screenshot - 06062015 - 12:29:59 PM.png](/public/imported_attachments/1/Screenshot - 06062015 - 12:29:59 PM.png)
                    ![Screenshot - 06062015 - 12:30:52 PM.png](/public/imported_attachments/1/Screenshot - 06062015 - 12:30:52 PM.png)

                    1 Reply Last reply Reply Quote 0
                    • DerelictD Offline
                      Derelict LAYER 8 Netgate
                      last edited by

                      The fourth rule in my example (This firewall) would block that.  As would blocking all RFC1918, also in my example.

                      I use the This firewall rule because it covers every interface on the node including any WANs.  (Try it - bring up the webgui by accessing it from the inside using your WAN address)

                      Pass specific local traffic (DNS and Ping)
                      Block more general local traffic (All RFC1918, This firewall, Specific local networks)
                      Pass everything else (The Internet)

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ Offline
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Yeah so your block rule stopping you from talking to lan net does not stop you from talking to pfsense interface in opt1 network.  Or say your wan interface.  While your allow rule allows you to go anywhere you want that did not get triggered by the block rule of lan net

                        You could add a firewall rule dest "this firewall" that would bock you from talking to anything pfsense might be listening on - keep in mind this would prevent from even talking to dns on pfsense.  Here are my rules I have set on my guestwlan - that keeps it from even using pfsense for dns and just allows ping to pfsense

                        wlanguestrules.png
                        wlanguestrules.png_thumb

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                        1 Reply Last reply Reply Quote 0
                        • D Offline
                          ditrone
                          last edited by

                          i added block all traffic this firewall rule at top of list on opt1 and captive portal no longer loads up. 
                          looks like i blocked out dns or something.  i dont understand how you can "keep users from using pfsense for dns"
                          or why, i want the users to use pfsense for dns, right?
                          removing this rule to get captive portal back online.
                          I think i got it figured out by following the instructions mentioned above

                          1 Reply Last reply Reply Quote 0
                          • D Offline
                            doktornotor Banned
                            last edited by

                            You really ONLY want to block the management ports. Not really sure what's the goal of shooting yourself in foot with blocking all traffic!!!

                            1 Reply Last reply Reply Quote 0
                            • DerelictD Offline
                              Derelict LAYER 8 Netgate
                              last edited by

                              I gave you exactly what you need to do.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ Offline
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                Not sure what you want you want to do on your network, if you want your guests to use pfsense dns and be able to resolve your local names.. That is up to you - my guests get handed an IP and the isp dns - they are there as guests to use the internet connection.  Not anything to do with my network.  I let them ping their gateway as verification that hey the wireless is actually working, etc.

                                But they have no need to use my internal dns to resolve google.com - the isp dns can do that for them, etc.

                                What is it you want to do exactly, and then write the rules to do that..  You have been given multiple examples.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                                1 Reply Last reply Reply Quote 0
                                • D Offline
                                  ditrone
                                  last edited by

                                  @doktornotor:

                                  You really ONLY want to block the management ports. Not really sure what's the goal of shooting yourself in foot with blocking all traffic!!!

                                  i dont want users on opt1 listening to lan traffic.

                                  1 Reply Last reply Reply Quote 0
                                  • D Offline
                                    doktornotor Banned
                                    last edited by

                                    @ditrone:

                                    i dont want users on opt1 listening to lan traffic.

                                    Huh? What? If am talking about the "This Firewall" rule. Plus, you have been given multiple solutions, really no idea what are you inventing here…

                                    1 Reply Last reply Reply Quote 0
                                    • D Offline
                                      ditrone
                                      last edited by

                                      @johnpoz:

                                      Not sure what you want you want to do on your network, if you want your guests to use pfsense dns and be able to resolve your local names.. That is up to you - my guests get handed an IP and the isp dns - they are there as guests to use the internet connection.  Not anything to do with my network.  I let them ping their gateway as verification that hey the wireless is actually working, etc.

                                      But they have no need to use my internal dns to resolve google.com - the isp dns can do that for them, etc.

                                      What is it you want to do exactly, and then write the rules to do that..  You have been given multiple examples.

                                      thank you everyone for examples, i will use them.

                                      1 Reply Last reply Reply Quote 0
                                      • D Offline
                                        ditrone
                                        last edited by

                                        here is how i ended setting this up

                                        ![Screenshot - 06072015 - 05:03:48 PM.png](/public/imported_attachments/1/Screenshot - 06072015 - 05:03:48 PM.png)
                                        ![Screenshot - 06072015 - 05:03:48 PM.png_thumb](/public/imported_attachments/1/Screenshot - 06072015 - 05:03:48 PM.png_thumb)

                                        1 Reply Last reply Reply Quote 0
                                        • D Offline
                                          doktornotor Banned
                                          last edited by

                                          Looks good. You can make ports alias (like, ManagementPorts or whatever) for 22+80+443 and make the first 3 rules into a single one.

                                          1 Reply Last reply Reply Quote 0
                                          • D Offline
                                            ditrone
                                            last edited by

                                            @doktornotor:

                                            Looks good. You can make ports alias (like, ManagementPorts or whatever) for 22+80+443 and make the first 3 rules into a single one.

                                            Excellent i was wondering how to add multiple ports to a firewall rule. 
                                            Using alliases might help with ram and swap consumption as well.
                                            Currently swap is 
                                            60% of 1024 MB
                                            and ram is
                                            65% of 467 MB

                                            Here is how i have it now and it is working fine.

                                            ![Screenshot - 06072015 - 05:30:06 PM.png](/public/imported_attachments/1/Screenshot - 06072015 - 05:30:06 PM.png)
                                            ![Screenshot - 06072015 - 05:30:06 PM.png_thumb](/public/imported_attachments/1/Screenshot - 06072015 - 05:30:06 PM.png_thumb)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.