Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Disabling pfSense web ui on WAN (entered from LAN) and other VLANS

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 6 Posters 4.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mysongranhills
      last edited by

      The only ports open on my WAN are for services I'm using (SSH/FTP/HTTP/Torrents, etc).

      I'm thinking you didn't quite understand what i was trying to say.

      If I browse to http://My-Public-IP from outside my home I do not get access to pfSense web ui. It only happens when browsing to public ip from with in the LAN.

      1 Reply Last reply Reply Quote 0
      • H
        hda
        last edited by

        You could use an explicit rule allowing:

        IPv4 TCP from LAN net * to LAN address ports 80, 443

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          So block those vlans from accessing firewall IPs on the management ports, 22, 80, 443, etc.

          What do the rules look like on your vlans you don't want to access your web gui from?

          So for example my guest wlan is locked down to only be able to ping the firewall on the interface in that vlan.  And it can not access any other vlans either with the allow that says ! (not) my other local networks. in that alias.

          blockaccessfirewallip.png
          blockaccessfirewallip.png_thumb

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            As already noted above, you should block access to "This Firewall" management ports.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              Pass traffic on This firewall (self) that you want people to be able to access (like DNS) then reject any to This firewall (self).

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • E
                EMWEE
                last edited by

                @mysongranhills:

                The only ports open on my WAN are for services I'm using (SSH/FTP/HTTP/Torrents, etc).

                I'm thinking you didn't quite understand what i was trying to say.

                No i do understand….you dont understand.

                1 Reply Last reply Reply Quote 0
                • M
                  mysongranhills
                  last edited by

                  Maybe I'm truly misunderstanding something obvious and if so I apologize profusely. But all the methods above seem to me to address blocking access to the web-ui in-of-itself, which is perfect for restricting certain VLANS. But on some VLANS I ONLY want to block access to the web-UI from the LAN when http://75.76.xxx.xxx is entered. If http://192.168.1.1 (or w/e internal IP) is entered I WANT to be able to access the web-ui.

                  Here is the link to the videohttps://www.youtube.com/watch?v=0duYxPIx8gU describing dns rebinding attacks and that a router is vulnerable (at least according to the video) if the web-ui can be accessed by typing public ip into browser from LAN.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    But on some VLANS I ONLY want to block access to the web-UI from the LAN when http://75.76.xxx.xxx is entered. If http://192.168.1.1 (or w/e internal IP) is entered I WANT to be able to access the web-ui.

                    So on those VLANs block just that destination instead of This firewall.

                    I, personally, don't see why it would matter - the webgui is the webgui - but knock yourself out.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      You do understand unless you have opened up the wan rules that the webgui is not available from the actual wan.  If your going to allow vlan X to access it via the vlan X ip address of pfsense - WTF does it matter if they can also access it via the wan IP from the lan side??

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 1
                      • M
                        mysongranhills
                        last edited by

                        Honestly I don't know why there would be a difference either but im not a security researcher presenting at blackhat and the claim he made was that if the WAN IP can be used to access the web-ui from lan that  you are vulnerable to DNS rebinding attacks. I was taking him at his word. Do you think this information is wrong?

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.