Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Want to block a network to interface groups

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 3 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      now will this rule affect the other networks (interfaces)  or will it only affect the interface  i assigned it to

      Rules are applied on traffic entering an interface, so any rule you create will only directly affect that network.  For example, if you place a rule on the VLAN10 tab (just making one up), it would affect all traffic coming from clients on the VLAN10 subnet as it enters the pfSense VLAN10 interface.  Firewall rules block traffic coming into an interface, not going out of the interface.  You have to think of it as traffic goes IN to the pfSense interface from the subnet, traffic flows OUT of the pfSense interface to the subnet.

      1 Reply Last reply Reply Quote 0
      • R
        robina80
        last edited by

        thanks guys for all your help,

        i have 4 tabs and they are all my network interfaces, and i have made a interface group called "house" which consists of "staff/servers/old_staff", the clients interface is on its own and seperate network

        i attach my screenshot of my clients tab

        the last bottom rule where i have set clients net to talk to any port and any destination, am i right in thinking it will only talk to the internet and NOT the other networks interfaces, or do i need to create a rule for that

        basically i want it to talk to the internet but NOT to ANY of the other networks

        rules.JPG
        rules.JPG_thumb

        1 Reply Last reply Reply Quote 0
        • KOMK
          KOM
          last edited by

          Your last rule is allowing everything on CLIENTS to talk everywhere, including your other LANs.

          1 Reply Last reply Reply Quote 0
          • R
            robina80
            last edited by

            Ok how do i go about it then ie to block the client net accessing the house networks

            1 Reply Last reply Reply Quote 0
            • KOMK
              KOM
              last edited by

              More than one way to do it.  Rules are processed top-down, first-match.  Try:

              Block IP4 All from CLIENTS net to OLD_STAFF net
              Block IP4 All from CLIENTS net to STAFF net
              Block IP4 All from CLIENTS net to SERVERS net
              Allow IP4 All from CLIENTS net to *

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Your rules are all hosed.

                First you are blocking to this firewall but only TCP so UDP, etc will be passed by the last rule. You probably want any.

                Second you are passing DNS but only TCP. You probably want TCP/UDP.

                In general, when you make a guest network you:

                • Pass traffic to specific local assets they need like Email and DNS

                • Reject traffic to more general local assets you don't want them to access like LAN, DMZ, and This firewall

                • Pass traffic to any any (the internet)

                https://doc.pfsense.org/index.php/Firewall_Rule_Basics

                https://doc.pfsense.org/index.php/Firewall_Rule_Troubleshooting

                https://doc.pfsense.org/index.php/Firewall_Rule_Processing_Order

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • R
                  robina80
                  last edited by

                  mmm, doesnt work

                  i can still ping my private network

                  heres a detail of my network and i attach a screenshot of my rules

                  interface groups -

                  allintf - old staff, clients, staff, servers

                  aliases -

                  allnet - 172.16.8.0/21, 172.16.24.0/24, 10.10.20.0/23, 172.17.4.0/22

                  privatenet - 172.16.8.0/21, 172.16.24.0/24, 10.10.20.0/23

                  my vm as you can see can ping my private network ip, my vm is on the client interface with ip 172.17.6.146

                  rules1.JPG
                  rules1.JPG_thumb

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    Why are you messing around with floating rules? Posting that screenshot tells us nothing. We have no idea what interfaces and directions you applied the rule to, and no idea if quick is enabled.

                    All of this matters.

                    Forget about saving time with an interface group and just put the rules on the interfaces where they belong.

                    After you get it working, look at implementing your management shortcuts.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • R
                      robina80
                      last edited by

                      sorted it!!!

                      i also made clients net part of the PrivateNet

                      rules1.JPG
                      rules1.JPG_thumb

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        Not how I'd do it but glad it's working for you. I think you're putting WAY too much emphasis on doing this on an interface group.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.