Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How do I isolate networks with Squid, Services still being Resolved

    Scheduled Pinned Locked Moved Firewalling
    11 Posts 2 Posters 744 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      Post screens of your rules instead of text about what you think they're doing.

      1 Reply Last reply Reply Quote 0
      • M
        mich04
        last edited by

        Here are screenshots of what I have going on, it might not be correct and if you guys see anything that is weird please let me know.

        LAN_RULES.png
        LAN_RULES.png_thumb
        Camera_RULES.png
        Camera_RULES.png_thumb
        Video_RULES.png
        Video_RULES.png_thumb
        Beta_RULES.png
        Beta_RULES.png_thumb
        BLOCKYDOOR_RULES.png
        BLOCKYDOOR_RULES.png_thumb
        WEB_SERVER_RULES.png
        WEB_SERVER_RULES.png_thumb
        NAT_RULES.png
        NAT_RULES.png_thumb

        1 Reply Last reply Reply Quote 0
        • KOMK
          KOM
          last edited by

          Your rules on BETA look OK although I don't know what in the alias Local_subnets.  One thing to point out is that you don't need those explicit block rules at the bottom.  The rules are processed top-down, first-match wins (floating rules are slightly different).  At the bottom, there is a hidden Deny All rule, so traffic that isn't passed by a preceding allow rule is blocked automatically.

          Lastly, the addition of a firewall rule will not block traffic if an existing state is already present.  So when you are playing with your rules, make sure you go to Diagnostics - States and clear any established states that match that traffic/rule.

          1 Reply Last reply Reply Quote 0
          • M
            mich04
            last edited by

            local_subnets are the vlans, Cameras, Video, Beta, Web_Server and VPN. I was holding onto explicitly stating the deny rule so I could log traffic as I was diagnosing problems. I did clear the states and reboot the router, but with Beta I am still able to access the web server with its clients (android, linux) as well as the web browser. I can not how ever ssh into it which shows that the isolate_beta rule is working to block ssh, but not the other items.

            Alias_Ports.png
            Alias_Ports.png_thumb
            Alias_Networks.png
            Alias_Networks.png_thumb

            1 Reply Last reply Reply Quote 0
            • M
              mich04
              last edited by

              Oh also here are my switch settings

              2018-04-20-122123_1366x768_scrot.png
              2018-04-20-122123_1366x768_scrot.png_thumb
              2018-04-20-122135_1366x768_scrot.png
              2018-04-20-122135_1366x768_scrot.png_thumb

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                Hmm, looks OK.

                Why is you 10.10.10.0 network a /27?

                I've seen funny things with the negate operator.  Instead of allowing to NOT Local, flip it around.  Block access to local and then allow all else.

                1 Reply Last reply Reply Quote 0
                • M
                  mich04
                  last edited by

                  I removed the 10.10.10.0 network it was a mistake, I just hadn't removed it. I do know what you mean about the inverted settings they can work in strange ways sometimes. I did change that. My server is still being resolved using the beta network. I just wish I could figure out what is passing the traffic. I the only traffic I see being generated when I refresh the page is the device to squid.

                  1 Reply Last reply Reply Quote 0
                  • M
                    mich04
                    last edited by

                    My ultimate goal was to work on a DMZ for the webserver, that's what starts this project.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mich04
                      last edited by

                      Ok working a little more on this today. I found a similar thread that had a solution that worked for them but it is not working for me.
                      https://forum.pfsense.org/index.php?topic=81331.15

                      I also saw another thread which I can not find now talking about the machines address changing when it passes through squid.
                      Device ip changes to pfsense address port 3128

                      So here are some relevant settings of my squid configuration after I had changed the bypass setting and rebooted.

                      2018-04-24-084411_1366x768_scrot.png
                      2018-04-24-084411_1366x768_scrot.png_thumb

                      1 Reply Last reply Reply Quote 0
                      • M
                        mich04
                        last edited by

                        I also just tried with Squid's ACL's to see if I could block networks 10.0.17.0/24 and 10.0.47.0/24  but it is still resolving in the web browser.

                        2018-04-24-091422_1366x768_scrot.png
                        2018-04-24-091422_1366x768_scrot.png_thumb

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.