Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Best Practice for Guest Network

    Scheduled Pinned Locked Moved Routing and Multi WAN
    14 Posts 3 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MeCJay12
      last edited by

      Good Morning, I have a question that is teasing my brain. I have a pfSense install with 6 vlans. 3 of them are privileged and 3 are not. I have the unpriv vlans sending all their traffic out the WAN with firewall rules that say "accept all, gateway wan". My problem is that the priv vlans have firewall rules accepting some traffic from the Internet (OpenVPN is allowed in to an OpenVPN server for example). These firewall rules work fine from the Internet but the unpriv vlans cannot use them. I assume that going through and resetting up all my wan accept rules on each unpriv interface will work but that is, from a management standpoint, not feasible. What ideas do people have? How can I get unpriv vlans to have the same access as Internet users without maintaining duplicate rule bases?

      1 Reply Last reply Reply Quote 0
      • NogBadTheBadN
        NogBadTheBad
        last edited by NogBadTheBad

        Something like this:-

        0_1546875461229_Screenshot 2019-01-07 at 15.36.35.png

        Ignore the lines I've marked out.

        h_ip_local is an alias that contains my local ip addresses, you could create an alias with all the RFC 1918 addresses as that would work too.

        You could create them as floating rules and just select the interfaces that need the rules.

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        1 Reply Last reply Reply Quote 0
        • M
          MeCJay12
          last edited by

          Tanks for giving my some of your time. What I see in your picture is some rules allowing the TEST net to a couple services then blocking the TEST net from any other access to the priv network. This is what I was talking about above. My unpriv network has the same access as any Internet user would. I have all the rules that allow unpriv/Internet access to the priv network on the WAN. Internet users have the correct access currently. I am trying to figure out how to get the unpriv network to be subject to the same rules without having to remake them all and maintain two copies of the same rules like you show above.

          1 Reply Last reply Reply Quote 0
          • NogBadTheBadN
            NogBadTheBad
            last edited by

            @nogbadthebad said in Best Practice for Guest Network:

            floating rules

            floating rules

            https://www.netgate.com/docs/pfsense/firewall/floating-rules.html

            Andy

            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

            johnpozJ 1 Reply Last reply Reply Quote 1
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @NogBadTheBad
              last edited by

              @mecjay12 said in Best Practice for Guest Network:

              I have all the rules that allow unpriv/Internet access to the priv network on the WAN.

              Huh? Rules on WAN have zero to do with a user on one of your networks going to the internet... Rules on the WAN have to do with unsolicited inbound traffic FROM the internet.

              If you are creating rules on the WAN to allow your users to access the internet your doing it wrong!!

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • M
                MeCJay12
                last edited by

                @NogBadTheBad Thanks for your time. I didn't think of that. Floating rules will be better than what I have now but not ideal. If I add a new interface/vlan, I have to go through and modify every rule to add the new interface. I will make a note but keep looking for a better solution.

                @johnpoz You misread. Mu unpriv networks all have one rule that says "accept all, gateway wan". They cannot access the other networks at all because all their traffic is shuffled out the WAN regardless. It was originally setup this way because my thought process was that if it goes out the WAN then it has to come back in the WAN to get to the priv network. If it comes in the WAN it goes through the rules that I want it to go through. Clearly this is incorrect. Once the traffic gets shuffled to the WAN it won't return.
                The quote you took is referring to states that I want all traffic to go through the rules on the WAN interface before it gets to the priv network. Since I want my unpriv networks to be treated the same as Internet traffic I want my networks to follow the same rules as I have on the WAN before getting to the priv network.

                1 Reply Last reply Reply Quote 0
                • NogBadTheBadN
                  NogBadTheBad
                  last edited by

                  You could just copy an existing rule and change the interface.

                  To be honest I like to see firewall rules on the actual interface rather than floating rules.

                  Andy

                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                  1 Reply Last reply Reply Quote 0
                  • M
                    MeCJay12
                    last edited by MeCJay12

                    That will inevitably cause asymmetric rules. This firewall has upwards of 500 rules and 3 people making changes.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Sounds like you have a MESS to be honest, and don't actually understand how rules are processed either.. Sending traffic out a specific gateway is not proper firewalling..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • M
                        MeCJay12
                        last edited by

                        @johnpoz Ok, how would you do this? 6 networks. 2 are WANs, 2 are unpriv LANs, 2 and priv LANs. The First unpriv LAN has whitelist Internet access via the first WAN. The Second unpriv LAN is a guest network that has full Internet access via the first WAN. Both unriv LANs should only have access internally if they follow the firewall rules that any other Internet user can. The priv LANs should have access wherever they need. One is a network of private IPs and the other is public IPs route to the firewall. We only have one firewall cluster handling this task. It used to be Fortinet firewalls, now we are trying to transition to pfSense. How would you do it?

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • NogBadTheBadN
                          NogBadTheBad
                          last edited by

                          It’s hard to read your posts, any chance you could use the return key ;)

                          Maybe draw us a diagram.

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @MeCJay12
                            last edited by johnpoz

                            @mecjay12 said in Best Practice for Guest Network:

                            How would you do it?

                            You have not stated anything of complexity there at all.. You have a couple of routed netblocks.. Great - those firewall just like anything just not natting.

                            While you might want to push traffic out a specific wan.. You would not use that as firewalling, you would actually create the specific rules blocking want you block before you allow the traffic out the specific wan network, etc.

                            Its all fine and good to policy route, but that is not a firewall rule in itself, its just a way to route traffic based on policy..

                            6 networks... I have more than on my home network... heheeh

                            That you have 500 some rules on your firewalls, with only 6 networks... Seems like someone doesn't understand something here that is for damn sure, especially if your firewalling via a policy route..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • M
                              MeCJay12
                              last edited by MeCJay12

                              0_1546884777103_Untitled.png

                              Requirements:

                              Both unpriv LANs go out WAN 1.

                              WAN 1 has no inbound traffic, only established traffic.

                              Both priv LANs use WAN 2 for outbound traffic.

                              There is inbound traffic to the priv LANs. The access rules are the same for unpriv LANs and Internet users the same.

                              Must be easy to add new interfaces/vlans later and no duplicate rules (to prevent one rule getting updated or created without another).

                              Current setup:

                              Both unpriv LANs are policy routed out WAN 1.

                              WAN 2 is the default gateway (I don't like this).

                              All inbound firewall rules for priv LANs are on WAN 2 (not floating).

                              Both priv LANs have allow all rules.

                              Both unpriv LANs were EXPECTED to egress WAN 1 then immediately ingress WAN 2 and filter through WAN 2's rules. (not functioning).

                              Potential solutions:

                              Replace WAN 2 inbound rules with floating rules for 'in' on each unpriv interface. Should fix immediate problem but be a pain if/when a new interface/vlan is added (would have to modify every rule).

                              Replace WAN 2 inbound rules with floating rules for 'out' on priv interfaces. Unsure if this would work because traffic getting blocked on ingress? Need to test.

                              1 Reply Last reply Reply Quote 0
                              • NogBadTheBadN
                                NogBadTheBad
                                last edited by

                                You maybe could look at Interfaces -> Interface Groups

                                "Interface Groups allow setting up rules for multiple interfaces without duplicating the rules.
                                If members are removed from an interface group, the group rules are no longer applicable to that interface."

                                https://www.netgate.com/docs/pfsense/interfaces/interface-groups.html

                                You'd just need to add any new interface / vlan to the group or floating rule.

                                Andy

                                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.