Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Getting in from my mobile phone

    Scheduled Pinned Locked Moved Firewalling
    16 Posts 9 Posters 1.5k Views 10 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ Offline
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      @making_sense_of_pfsense said in Getting in from my mobile phone:

      leased random IP addresses?

      Not only that.. Might be a ipv6 to ipv4 gateway so the IP could be shared by phone users of the same carrier. What if your on a wifi hotspot at starbucks or something and not coming through your carrier cell to IP network..

      Just setup VPN and open to the world.. VPN is pretty freaking secure - worse case would be some noise in the openvpn log.

      You could try and setup some dynamic dns thing... But your phones IP could change all the time, and pfsense would only update this alias every few minutes anyway.

      You could use say pfblockerng to block IP ranges from hitting your vpn port. So if your only in the US and are not going to travel you could set it up so only IPs listed as being in the US can access your vpn port.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

      1 Reply Last reply Reply Quote 1
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        The solution to your problem is OpenVPN or IPsec VPN.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • GertjanG Offline
          Gertjan @Making_sense_of_pfSense
          last edited by

          @making_sense_of_pfsense said in Getting in from my mobile phone:

          despite the fact that it’s leased random IP addresses?

          What you’re suggesting is leaving the VPN port open to the world and I don’t want that.

          Ok, prepare yourself for some double authentication : VPN + firewall enforcement :

          Note down the IP your Phone is using.
          Use the same phone to call the guy that has local access to pfSense.
          Let him enter your IP as the only one allowed in the firewall wall rule on WAN, he'll be changing the "source" address.

          When he ok'ed, you can enter.

          Keep in mind that the IP on your phone could be given to someone in the else in the near future, so when done, call up your guy again, and let him de activate the firewall rule on WAN.

          PS : of course everybody opens a VPN server with full world wide access. It's build to handle this situation.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          johnpozJ 1 Reply Last reply Reply Quote 0
          • DerelictD Offline
            Derelict LAYER 8 Netgate
            last edited by

            I leave my OpenVPN and IPsec mobile servers open to the world without hesitation.

            Certainly better than some cooked-up scheme to limit access to arbitrary source IP addresses.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 1
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @Gertjan
              last edited by

              @gertjan said in Getting in from my mobile phone:

              Use the same phone to call the guy that has local access to pfSense.

              Freaking Brilliant idea ;) Completely foolproof and secure to be sure. As long he validates todays codes, don't forget to bring your code book with you. I would prob lock it in a briefcase secured to your wrist with handcuffs..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

              1 Reply Last reply Reply Quote 0
              • M Offline
                Making_sense_of_pfSense
                last edited by

                Is this how you welcome newcomers? Congratulations...

                Running pfSense Community Edition 2.7.2 on a Qotom Mini PC.

                NogBadTheBadN 1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Huh?? Someone didn't have their coffee this morning?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                  1 Reply Last reply Reply Quote 0
                  • NogBadTheBadN Offline
                    NogBadTheBad @Making_sense_of_pfSense
                    last edited by NogBadTheBad

                    @making_sense_of_pfsense said in Getting in from my mobile phone:

                    Is this how you welcome newcomers? Congratulations...

                    To be fair I gave you the solution in my first post, it's up to you if you implement it or not.

                    Also if you search the forum, this question gets asked many times.

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    1 Reply Last reply Reply Quote 0
                    • SammyWooS Offline
                      SammyWoo @Making_sense_of_pfSense
                      last edited by

                      @making_sense_of_pfsense Realize you maybe learning your ABC of IP routing... but this IP thing is folly... your firewall only knows the last hop address where the packet is coming from, most likely your ISP's equipment... Bottom line is, this is simple SECURED REMOTE ACCESS, and VPN is it as already mentioned. You will be identified and allowed access based on your VPN password authorizing the encryption key.

                      JKnottJ 1 Reply Last reply Reply Quote 0
                      • JKnottJ Offline
                        JKnott @SammyWoo
                        last edited by

                        @sammywoo said in Getting in from my mobile phone:

                        but this IP thing is folly… your firewall only knows the last hop address where the packet is coming from, most likely your ISP’s equipment…

                        ????

                        The router's IP address is not contained in the packet, only the source & destination addresses. A router's address may be known via routing tables, but not always. Point to point links, don't need an IP address. On IPv6 the router's address is likely a link local and that only has to be unique on the link. So, a router IP address might be known, but you can't bet on it. On the other hand, the MAC address is likely known, though again there might not be one on a point to point link.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • K Offline
                          kpa
                          last edited by kpa

                          @SammyWoo Totally incorrect, please take a read of the IP header specification and you'll notice that it includes a source address and a destination address and neither of those are modified under normal routing, it's only when NAT gets intruduced to the picture either one of them gets modified. Forwarding to a gateway doesn't either modify the headerw, the IP packets are just tossed to the next hop unmodified.

                          https://en.wikipedia.org/wiki/IPv4#Header

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.