Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Looking for some advice.

    Firewalling
    3
    17
    1.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      "I still see the DirecTV boxes(192.168.1.66-67) pinging 239.255.255.250:1900"

      Yes you would.. this is from a private network.. Are you blocking private networks?  If not it would be blocked by the default rule, which is normally logged.  Again click on the X or move your mouse over it and you should see which rule blocked that specific traffic.  Please post a picture of your rules..

      What is a wan access rule??  You have port forwarded something?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • mtarboxM
        mtarbox
        last edited by

        If I block private networks, won't I be locked out?
        I have port 8080 forwarded so I can access pfsense from work in case if my family has an issue and can't access the internet.
        I have a feeling I am going to get educated, which by all means I need to be.

        ![Screenshot from 2017-09-15 15-59-20.png](/public/imported_attachments/1/Screenshot from 2017-09-15 15-59-20.png)
        ![Screenshot from 2017-09-15 15-59-20.png_thumb](/public/imported_attachments/1/Screenshot from 2017-09-15 15-59-20.png_thumb)

        Si vis pacem, para pactum.

        1 Reply Last reply Reply Quote 0
        • mtarboxM
          mtarbox
          last edited by

          The rule that blocks.

          ![Screenshot from 2017-09-15 16-06-37.png](/public/imported_attachments/1/Screenshot from 2017-09-15 16-06-37.png)
          ![Screenshot from 2017-09-15 16-06-37.png_thumb](/public/imported_attachments/1/Screenshot from 2017-09-15 16-06-37.png_thumb)
          ![Screenshot from 2017-09-15 16-06-37.png](/public/imported_attachments/1/Screenshot from 2017-09-15 16-06-37.png)
          ![Screenshot from 2017-09-15 16-06-37.png_thumb](/public/imported_attachments/1/Screenshot from 2017-09-15 16-06-37.png_thumb)

          Si vis pacem, para pactum.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            No blocking private you would not be locked out.. Unless you were trying to access from a private IP??

            But why do you have 8080 open to pfsense?  Not a good idea to open pfsense web gui to the public internet.. Its a really really really BAD idea!!  You have vpn setup, so if you want to access pfsense web gui then just VPN In..

            Yes that is being blocked by the default deny rule.. If you do not want to see those then create a block rule that does not log it.  Or turn off your default logging rule and create rules that log what you want to see that is blocked.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • mtarboxM
              mtarbox
              last edited by

              I thought that the 192.168 and the like were private IP's?
              I have it open as I can not figure out openvpn.

              Si vis pacem, para pactum.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                It is.. But that is not the internet that is a transit network between pfsense and your isp router.  But that is all moot anyway.  What is logging that block is your default deny.,

                openvpn is run the wizard, export your configuration and go.. It really is that simple!  if your trying to access from work - its possible work is blocking your UDP access?  If so setup openvpn to use tcp on a port that is open from say 443 is pretty always open, you can even bounce off a proxy if using tcp..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • mtarboxM
                  mtarbox
                  last edited by

                  Johnpoz, thank you for your lessons today.
                  I went into the modem, took the pfsense box out of the DMZ, disabled then deleted the wan access rule, and deleted the current openvpn rule. I will run the wizard again and see if I can figure it out.
                  Work might have it blocked.

                  And I finally figured out openvpn. I shut off my wifi on my phone and connected without issues. AWESOME! I feel much better and maybe a little smarter thanks to your input and guidance today johnpoz.

                  Si vis pacem, para pactum.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    what we are here for - glad could help!

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    1 Reply Last reply Reply Quote 0
                    • JKnottJ
                      JKnott
                      last edited by

                      So all three of the ports I'm using are still layer 2. I thought that with different IP's, 192.168.0 and 192.168.1, etc, it was technically a different network.

                      Everything on the local network is on the same layer 2 network, even with completely different address ranges.  Layer 2 (MAC addresses) refers to addressing on the local network, but layer 3 (IP addresses) can be world wide, though RFC 1918 are confined to local networks.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        ^ yup, layer 2 is also LLC (logical link control) but that might getting a bit deeper than you need..

                        Keep in mind that you can create different layer 2 networks via smart switch, or different physical hardware..  A router would have 2 layer 2 networks its connected to.. The wan side and the lan side.. Or more even if has multiple lan or wan interfaces, etc.

                        The only reason rfc1918 addresses are confined to local network is they do not actually route over the internet..  If you traffic to your isp with destination of 192.168.14.100 for example.. It has no idea where to send that.. That network is not routed on the internet..

                        btw: not sure where you came up with the /16 in your posts..  From your post your networks on pfsense are /24..  I think users still get hung up on class of IP ranges, which has really been meaningless since cidr.. Some 24 years ago..

                        Yes the 192.168.0.0/16 space is defined as rfc1918 or local address space that does not route on the internet.  But /16 is the whole netblock that can be used - you would never actually use a /16 mask on network you create..  That space would allow for 65k addresses, you would never put 65k address on the same layer 2/broadcast domain..  Nobody would ever be able to send real data they would all be too busy listing to broadcasts ;)  The mask used to create the size of your network should be appropriate for the number of hosts you would be putting on that network.. /24 is very common because it allows for plenty of devices on that same network 254.. And it makes it very easy for humans to easy see what network it is – 192.168.X.0

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.