Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfblocker … is this normal after 3 hours of uptime

    Scheduled Pinned Locked Moved pfBlockerNG
    16 Posts 6 Posters 12.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      doktornotor Banned
      last edited by

      @trinidadrancheria:

      Sometimes you have to block the whole world except for a couple of countries. Such as when you're running multiple websites for a business which is regulated.

      No. The correct approach there is to whitelist the countries you need. NOT blacklist all the rest. Again, absurd overhead.

      1 Reply Last reply Reply Quote 0
      • T
        trinidadrancheria
        last edited by

        Do you have any examples such as we only allow US Canada and Australia.

        And by the way Dr. thank you for all your work you are making PF sense a great product.

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by

          @trinidadrancheria:

          Do you have any examples such as we only allow US Canada and Australia.

          Well yes, of course.

          1/ Create a custom list like this:

          2/ Use the pfB_CC_WHITE_V4 (or whatever else you named it, prefixed by pfB_) as alias in source field in your firewall rules to allow access.

          (Can do the same for IPv6 of course, just use _v6.txt in the path to file.)

          1 Reply Last reply Reply Quote 2
          • T
            trinidadrancheria
            last edited by

            Cool! You just saved me and anyone reading this thread a lot of overhead. Thank you very much.

            1 Reply Last reply Reply Quote 0
            • F
              fantasypoo
              last edited by

              Thanks so much!!!  I was worried that everyone was out to get me or I had the door open on my firewall and attracting all sorts of unwelcome guests!

              1 Reply Last reply Reply Quote 0
              • N
                n3by
                last edited by

                at least for me cc list can be found in this path:

                /usr/pbi/pfblockerng-amd64/share/GeoIP/cc/
                
                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  The above applies to what's distributed from official package repository. Not any -dev versions from private repos.

                  1 Reply Last reply Reply Quote 0
                  • N
                    n3by
                    last edited by

                    Thank you for clarification.

                    Can you please let us know where is the path - file for alias list already defined manual in Firewall: Aliases: IP … which I can see in Diagnostics: Tables ... ?

                    I try to search for defined alias name to find the path where file is saved/stored but no success.

                    I'd like to add few of that aliases defined there to pfblocker whitelist.

                    thx.

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by

                      Nowhere as file. It's stored in config.xml. You cannot use pfSense aliases like this, not even sure what'd be the purpose. The ONLY purpose of the exercise described above is to create an alias usable with firewall rules – which you already have.

                      1 Reply Last reply Reply Quote 0
                      • N
                        n3by
                        last edited by

                        My only reason was to automate the work so I will not have to manual add IP I already have from aliases-firewall to pfb alias-Custom Address.

                        I understand, thank you.

                        1 Reply Last reply Reply Quote 0
                        • T
                          trinidadrancheria
                          last edited by

                          Thanks. Worked good…

                          With all the PFSense boxes and WAN interfaces and firewall rules we use, I did it the lazy way :P
                          I defined the alias as in this thread, then created a rule for each interface above the other rules that was a block if NOT the allowed Countries. Also kept it simple for troubleshooting.

                          1 Reply Last reply Reply Quote 0
                          • D
                            damelloman
                            last edited by

                            I kept doing the wrong thing and "blocking the whole world" and didn't know HOW to do this. Thank you all for helping me understand! :) Smarter not harder!

                            NollipfSenseN 1 Reply Last reply Reply Quote 0
                            • NollipfSenseN
                              NollipfSense @damelloman
                              last edited by

                              @damelloman said in Pfblocker … is this normal after 3 hours of uptime:

                              I kept doing the wrong thing and "blocking the whole world" and didn't know HOW to do this. Thank you all for helping me understand! :) Smarter not harder!

                              We all as newbies did this only to learn later that it made no sense.

                              pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                              pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                              1 Reply Last reply Reply Quote 1
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.