Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Separate Network

    Scheduled Pinned Locked Moved Routing and Multi WAN
    25 Posts 6 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      ditrone
      last edited by

      i added block all traffic this firewall rule at top of list on opt1 and captive portal no longer loads up. 
      looks like i blocked out dns or something.  i dont understand how you can "keep users from using pfsense for dns"
      or why, i want the users to use pfsense for dns, right?
      removing this rule to get captive portal back online.
      I think i got it figured out by following the instructions mentioned above

      1 Reply Last reply Reply Quote 0
      • D Offline
        doktornotor Banned
        last edited by

        You really ONLY want to block the management ports. Not really sure what's the goal of shooting yourself in foot with blocking all traffic!!!

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          I gave you exactly what you need to do.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator
            last edited by

            Not sure what you want you want to do on your network, if you want your guests to use pfsense dns and be able to resolve your local names.. That is up to you - my guests get handed an IP and the isp dns - they are there as guests to use the internet connection.  Not anything to do with my network.  I let them ping their gateway as verification that hey the wireless is actually working, etc.

            But they have no need to use my internal dns to resolve google.com - the isp dns can do that for them, etc.

            What is it you want to do exactly, and then write the rules to do that..  You have been given multiple examples.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

            1 Reply Last reply Reply Quote 0
            • D Offline
              ditrone
              last edited by

              @doktornotor:

              You really ONLY want to block the management ports. Not really sure what's the goal of shooting yourself in foot with blocking all traffic!!!

              i dont want users on opt1 listening to lan traffic.

              1 Reply Last reply Reply Quote 0
              • D Offline
                doktornotor Banned
                last edited by

                @ditrone:

                i dont want users on opt1 listening to lan traffic.

                Huh? What? If am talking about the "This Firewall" rule. Plus, you have been given multiple solutions, really no idea what are you inventing here…

                1 Reply Last reply Reply Quote 0
                • D Offline
                  ditrone
                  last edited by

                  @johnpoz:

                  Not sure what you want you want to do on your network, if you want your guests to use pfsense dns and be able to resolve your local names.. That is up to you - my guests get handed an IP and the isp dns - they are there as guests to use the internet connection.  Not anything to do with my network.  I let them ping their gateway as verification that hey the wireless is actually working, etc.

                  But they have no need to use my internal dns to resolve google.com - the isp dns can do that for them, etc.

                  What is it you want to do exactly, and then write the rules to do that..  You have been given multiple examples.

                  thank you everyone for examples, i will use them.

                  1 Reply Last reply Reply Quote 0
                  • D Offline
                    ditrone
                    last edited by

                    here is how i ended setting this up

                    ![Screenshot - 06072015 - 05:03:48 PM.png](/public/imported_attachments/1/Screenshot - 06072015 - 05:03:48 PM.png)
                    ![Screenshot - 06072015 - 05:03:48 PM.png_thumb](/public/imported_attachments/1/Screenshot - 06072015 - 05:03:48 PM.png_thumb)

                    1 Reply Last reply Reply Quote 0
                    • D Offline
                      doktornotor Banned
                      last edited by

                      Looks good. You can make ports alias (like, ManagementPorts or whatever) for 22+80+443 and make the first 3 rules into a single one.

                      1 Reply Last reply Reply Quote 0
                      • D Offline
                        ditrone
                        last edited by

                        @doktornotor:

                        Looks good. You can make ports alias (like, ManagementPorts or whatever) for 22+80+443 and make the first 3 rules into a single one.

                        Excellent i was wondering how to add multiple ports to a firewall rule. 
                        Using alliases might help with ram and swap consumption as well.
                        Currently swap is 
                        60% of 1024 MB
                        and ram is
                        65% of 467 MB

                        Here is how i have it now and it is working fine.

                        ![Screenshot - 06072015 - 05:30:06 PM.png](/public/imported_attachments/1/Screenshot - 06072015 - 05:30:06 PM.png)
                        ![Screenshot - 06072015 - 05:30:06 PM.png_thumb](/public/imported_attachments/1/Screenshot - 06072015 - 05:30:06 PM.png_thumb)

                        1 Reply Last reply Reply Quote 0
                        • DerelictD Offline
                          Derelict LAYER 8 Netgate
                          last edited by

                          If you want them to be able to ping and do dns lookups, I don't see why you wouldn't pass those then block everything else.  It's more sound firewall rule design.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • D Offline
                            ditrone
                            last edited by

                            @Derelict:

                            If you want them to be able to ping and do dns lookups, I don't see why you wouldn't pass those then block everything else.  It's more sound firewall rule design.

                            I tried blocking all rfc1918 traffic on the interface but i can't seem to move that rule below the rules allowing dns.
                            captive portal stops working. well captive portal works but dns doesnt.
                            when you say " It's more sound firewall rule design." what do you mean?

                            1 Reply Last reply Reply Quote 0
                            • DerelictD Offline
                              Derelict LAYER 8 Netgate
                              last edited by

                              Pass what you need them to have access to and block everything else.  The way you're doing it if you start another service on the firewall, change your webgui port, etc you have to remember to specifically block it.

                              You need to add things like DNS servers to your captive portal allowed IP addresses in addition to passing the DNS traffic in the regular firewall.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.