Firewall port numbers
-
Unless you play games, they are all going to have their own ports. Agreed, typically its a small list. You don't need to open ntp, pfsense does the ntp and you sync off pfsense.
But we are not even sure what the OP is wanting to do.. He talks about scanning his clients.. What does that have to do with their outbound traffic to the internet?
-
Unless you play games, they are all going to have their own ports. Agreed, typically its a small list. You don't need to open ntp, pfsense does the ntp and you sync off pfsense.
But we are not even sure what the OP is wanting to do.. He talks about scanning his clients.. What does that have to do with their outbound traffic to the internet?
Absolutely nothing ::) That's why I directed the response at Derelict. Agree on the NTP; the list was from a homebrew I had been using (FreeBSD with pf) before I grabbed a SG2440.
I'm guessing the OP may not understand how pfSense works/is intended to be used.
-
"I'm guessing the OP may not understand how pfSense works/is intended to be used."
Agreed ;) I think its more than just pfsense and just networking/firewalls in general..
But to be honest, in a home setup I really don't buy the lock every port down other than the ports you use/common to the public net. What does it get you other than grief when someone in the house trying to do something that doesn't work, or you yourself something doesn't work because you blocked outbound traffic on xyz..
Do you think that is going to stop viruses from phoning the mothership?
-
But to be honest, in a home setup I really don't buy the lock every port down other than the ports you use/common to the public net. What does it get you other than grief when someone in the house trying to do something that doesn't work, or you yourself something doesn't work because you blocked outbound traffic on xyz..
Exactly. My mothership would be listening on a common port anyway. It's stupid and a waste of time. I'm not firewalling and segmenting a bunch of PoS terminals.
You'd still have to pass NTP to LAN address unless that is a magic, hidden rule too.
-
But to be honest, in a home setup I really don't buy the lock every port down other than the ports you use/common to the public net. What does it get you other than grief when someone in the house trying to do something that doesn't work, or you yourself something doesn't work because you blocked outbound traffic on xyz..
Exactly. My mothership would be listening on a common port anyway. It's stupid and a waste of time. I'm not firewalling and segmenting a bunch of PoS terminals.
You'd still have to pass NTP to LAN address unless that is a magic, hidden rule too.
Nope, I understand it's not going to stop malware and such (gee, everyone has http open, so lets use that ;D ). It was more of a learning experience for me when I went from a dialup to broadband a while ago. Nothing more than that, just me trying to be aware of the traffic that is on/generated by my machines at home. I'm sure you've done it, but for anyone that has never sniffed a network with Windows machines may not realize how noisy they are on a network (SMB and related stuff, multicast DNS things) and trying to figure out how to turn them off took me down "GUI hell". I just wanted to be aware of what was normal for me.
-
That is fine, but curious why did you offer up to a user that clearly doesn't have clue one to how any of it works anyway..
"but the better way is start with a default deny,"
You know how much grief its going to cause this guy when this doesnt work, that doesn't work, etc. etc..
Pfsense uses a default any any on the lan out of the box for a reason… Because if they didn't a vast majority of users wouldn't have a clue how to get it working.. ;)
-
I keep forgetting the target audience.
-
I do it all the time myself.. You would hope people smart enough to use pfsense would have a basic understanding of the concepts involved with tcp/firewalling/routing, etc. But the more I read threads here the more I am reminded that a large portion of pfsense users are just completely clueless to any of even the most basic concepts.
And sad to say many of them don't even want to learn.. They just want information spoon fed to them, what do they click to get x working without even basic understanding of how x works.
But what makes it all worth it is those few people that want to learn, and spreading the love of our psfsense to those new learners ;)
I agree with you that a default deny, or even just logging of traffic can be a huge learning experience to what sort of traffic a OS might spew about.. What is needed, what is fluff and nonsense can be a large undertaking for someone new to the concepts for sure.
-
…jjeeeeeh, same with my car mechanic, always talks about tech stuff, although only thing I want is to DRIVE the car...
-
Can I thank you all for the input !
And yes Johnpoz ! although lots and lots of reading its often quit difficult to understand the basics ! …Ive got to do it all by myself !
Anyway your answer makes a lot clear to me ! (still much to learn and todo !).....