Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Want to block a network to interface groups

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 3 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      robina80
      last edited by

      Thanks for all your input another question is

      I told you i had 4 nics and for those nics it automatically creates new firewall rule tabs for each of those interfaces

      Lets say on one of the tabs (interfaces)  i create a rule for any proto to any source to any dest,  now will this rule affect the other networks (interfaces)  or will it only affect the interface  i assigned it to

      Ie can i create all my rules for all networks under one interface tab as i noticed the source/dest drop down box has got all my interfaces ie networks but at the top where it says what interface do you want to select this rule for this is what im bit suspicious about

      Cheers

      Rob

      1 Reply Last reply Reply Quote 0
      • KOMK
        KOM
        last edited by

        now will this rule affect the other networks (interfaces)  or will it only affect the interface  i assigned it to

        Rules are applied on traffic entering an interface, so any rule you create will only directly affect that network.  For example, if you place a rule on the VLAN10 tab (just making one up), it would affect all traffic coming from clients on the VLAN10 subnet as it enters the pfSense VLAN10 interface.  Firewall rules block traffic coming into an interface, not going out of the interface.  You have to think of it as traffic goes IN to the pfSense interface from the subnet, traffic flows OUT of the pfSense interface to the subnet.

        1 Reply Last reply Reply Quote 0
        • R
          robina80
          last edited by

          thanks guys for all your help,

          i have 4 tabs and they are all my network interfaces, and i have made a interface group called "house" which consists of "staff/servers/old_staff", the clients interface is on its own and seperate network

          i attach my screenshot of my clients tab

          the last bottom rule where i have set clients net to talk to any port and any destination, am i right in thinking it will only talk to the internet and NOT the other networks interfaces, or do i need to create a rule for that

          basically i want it to talk to the internet but NOT to ANY of the other networks

          rules.JPG
          rules.JPG_thumb

          1 Reply Last reply Reply Quote 0
          • KOMK
            KOM
            last edited by

            Your last rule is allowing everything on CLIENTS to talk everywhere, including your other LANs.

            1 Reply Last reply Reply Quote 0
            • R
              robina80
              last edited by

              Ok how do i go about it then ie to block the client net accessing the house networks

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                More than one way to do it.  Rules are processed top-down, first-match.  Try:

                Block IP4 All from CLIENTS net to OLD_STAFF net
                Block IP4 All from CLIENTS net to STAFF net
                Block IP4 All from CLIENTS net to SERVERS net
                Allow IP4 All from CLIENTS net to *

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Your rules are all hosed.

                  First you are blocking to this firewall but only TCP so UDP, etc will be passed by the last rule. You probably want any.

                  Second you are passing DNS but only TCP. You probably want TCP/UDP.

                  In general, when you make a guest network you:

                  • Pass traffic to specific local assets they need like Email and DNS

                  • Reject traffic to more general local assets you don't want them to access like LAN, DMZ, and This firewall

                  • Pass traffic to any any (the internet)

                  https://doc.pfsense.org/index.php/Firewall_Rule_Basics

                  https://doc.pfsense.org/index.php/Firewall_Rule_Troubleshooting

                  https://doc.pfsense.org/index.php/Firewall_Rule_Processing_Order

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • R
                    robina80
                    last edited by

                    mmm, doesnt work

                    i can still ping my private network

                    heres a detail of my network and i attach a screenshot of my rules

                    interface groups -

                    allintf - old staff, clients, staff, servers

                    aliases -

                    allnet - 172.16.8.0/21, 172.16.24.0/24, 10.10.20.0/23, 172.17.4.0/22

                    privatenet - 172.16.8.0/21, 172.16.24.0/24, 10.10.20.0/23

                    my vm as you can see can ping my private network ip, my vm is on the client interface with ip 172.17.6.146

                    rules1.JPG
                    rules1.JPG_thumb

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Why are you messing around with floating rules? Posting that screenshot tells us nothing. We have no idea what interfaces and directions you applied the rule to, and no idea if quick is enabled.

                      All of this matters.

                      Forget about saving time with an interface group and just put the rules on the interfaces where they belong.

                      After you get it working, look at implementing your management shortcuts.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • R
                        robina80
                        last edited by

                        sorted it!!!

                        i also made clients net part of the PrivateNet

                        rules1.JPG
                        rules1.JPG_thumb

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          Not how I'd do it but glad it's working for you. I think you're putting WAY too much emphasis on doing this on an interface group.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.