Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense Firewall Rules

    Scheduled Pinned Locked Moved Firewalling
    21 Posts 3 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 1
      19Giugno
      last edited by

      Hi there,
      I am quite new at pfSense and firewalling in general. I got the pfSense installed and OpenVPN to connect from external. I got a web server. I want to set up the firewall so that only whitelisted IP address and the VPN clients can access the web sites on the server (http and https). I was able to create the rule to filter the whitelist, but then I am not able to access the sites from my VPN client...

      Any help please?

      D.

      1 Reply Last reply Reply Quote 0
      • KOMK
        KOM
        last edited by

        Without any details whatsoever, it's going to be almost impossible to help you. Post some screens of your NATs, WAN rules and OVPN config.

        1 Reply Last reply Reply Quote 0
        • 1
          19Giugno
          last edited by

          Here they are.

          Thanks.

          0_1551297041643_71768064-7092-41eb-8a41-94491791ffe9-image.png

          0_1551297052759_bab79e9c-e8d3-4a00-9eaf-e63e82281649-image.png

          0_1551297060182_de6285d1-c85c-4f0f-b546-44d144d85a7b-image.png

          1 Reply Last reply Reply Quote 0
          • KOMK
            KOM
            last edited by

            Have you added any rules on the OpenVPN firewall tab? Only WAN/LAN get default rules. All other interfaces MUST have their rules manually added.

            1 Reply Last reply Reply Quote 0
            • 1
              19Giugno
              last edited by

              Here

              0_1551297583185_e0b1bd3f-6fd8-4757-94eb-158aa47f7c02-image.png

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                How are you testing from inside or outside your network? From the above screens, you aren't limiting access at the firewall so you should be able to hit your web server from anywhere unless you're limiting access via web server directives. Does that work if oyu try to access your web server without being on the VPN? What is in that IBO_Web alias? It should hold the IP address of your web server. You didn't put in the IPs of the allowed clients in that alias, did you?

                1 Reply Last reply Reply Quote 0
                • 1
                  19Giugno
                  last edited by

                  Hi Kom,
                  i am testing from outside the network, connected to the VPN and not. IBO_Web contains the IP address of the web server.

                  Here some screenshots with some new configuration. I added a NAT entry for the OVPN, but still no luck. IP whitelisting is working, only allowed IPs can access the web server; but OVPN clients cannot. They are being rejected because of the "Default deny rule IPv4 (1000000103)" (from the firewall log). For some reasons even if connected to the VPN they hit the firewall with the machine public IP address. For example, the VPN public IP address is XX.XXX.XXX.XX, if I go to whatsmyip I see it correctly XX.XXX.XXX.XX, but in the firewall log the entry is YY.YYY.YYY.YY:80 TCP:S where YY.YYY.YYY.YY is my machin public IP address. Hope it makes sense...

                  2_1551339950284_Nat.png 1_1551339950284_Rules_OVPN.png 0_1551339950283_Rules_Wan.png

                  1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM
                    last edited by

                    What's in your Allowed_IBO alias? Can I assume that you are including the OVPN subnet in it?

                    1 Reply Last reply Reply Quote 0
                    • 1
                      19Giugno
                      last edited by

                      It wasn't. I added it, but still doesn't work when connected to the VPN.

                      1 Reply Last reply Reply Quote 0
                      • KOMK
                        KOM
                        last edited by

                        Hold on a sec. Your VPN users are already inside your network, therefore they should not be using the NAT in the first place. Add a host override to your DNS config so that it resolves your web server's hostname to its LAN IP address. Then they should just be able to connect without issue.

                        1 Reply Last reply Reply Quote 0
                        • 1
                          19Giugno
                          last edited by

                          Kom, this is what I added to the DNS Resolver:

                          Host Overrides
                          bo-temp xxxx.com 192.168.22.3 DNS

                          Still not working. If I ping 192.168.22.3 from my machine connected to the VPN, I get a response. If I ping bo-temp.xxxx.com it resolves with the network public IP address.

                          GrimsonG 1 Reply Last reply Reply Quote 0
                          • KOMK
                            KOM
                            last edited by

                            This should be easy. You should be able to access your internal web server via the VPN without any magic. Let's start simple: Can you access it via its LAN IP address? eg http://192.168.22.3/?

                            1 1 Reply Last reply Reply Quote 0
                            • GrimsonG
                              Grimson Banned @19Giugno
                              last edited by

                              @19giugno said in pfSense Firewall Rules:

                              Still not working. If I ping 192.168.22.3 from my machine connected to the VPN, I get a response. If I ping bo-temp.xxxx.com it resolves with the network public IP address.

                              So what DNS is your machine using? For the DNS overrides to work it obviously has to use the DNS resolver/forwarder from the pfSense instance where the override is configured.

                              1 1 Reply Last reply Reply Quote 0
                              • 1
                                19Giugno @KOM
                                last edited by

                                @kom said in pfSense Firewall Rules:

                                http://192.168.22.3/?

                                Yes I can.

                                1 Reply Last reply Reply Quote 0
                                • 1
                                  19Giugno @Grimson
                                  last edited by

                                  @grimson said in pfSense Firewall Rules:

                                  @19giugno said in pfSense Firewall Rules:

                                  Still not working. If I ping 192.168.22.3 from my machine connected to the VPN, I get a response. If I ping bo-temp.xxxx.com it resolves with the network public IP address.

                                  So what DNS is your machine using? For the DNS overrides to work it obviously has to use the DNS resolver/forwarder from the pfSense instance where the override is configured.

                                  Hi Grimson,
                                  I am using assigned DNS (Obtain DNS server address automatically). I am not sure how to check if I am using the DNS resolver/forwarder? And how I can be sure to use it?

                                  1 Reply Last reply Reply Quote 0
                                  • KOMK
                                    KOM
                                    last edited by

                                    OK so your problem is DNS-related. Status - Services will tell you if you're using Forwarder (dnsmasq) or Resolver (unbound). Or you could go to Services - DNS Forwarder and see if it's enabled, likewise for Services - DNS Resolver.

                                    It looks to me like you don't have your OpenVPN config quite right. In your config under Advanced Client Settings, are you pushing pfSense DNS to your VPN clients?

                                    1 Reply Last reply Reply Quote 0
                                    • 1
                                      19Giugno
                                      last edited by

                                      Hi KOM,
                                      DNS Resolver is enabled, DNS Forwarder is not.

                                      In OperVPN, Advanced Client Settings there is nothing enabled.

                                      Thanks.

                                      1 1 Reply Last reply Reply Quote 0
                                      • KOMK
                                        KOM
                                        last edited by

                                        So then try checking the DNS Server Enable box and then add your pfSense LAN IP address as DNS Server 1.

                                        1 Reply Last reply Reply Quote 0
                                        • 1
                                          19Giugno @19Giugno
                                          last edited by

                                          @19giugno said in pfSense Firewall Rules:

                                          Hi KOM,
                                          DNS Resolver is enabled, DNS Forwarder is not.

                                          In OperVPN, Advanced Client Settings there is nothing enabled.

                                          Thanks.

                                          Yes! That worked! It works now. Thank you so much!

                                          I got another question now, if the answer is yes I will open a new thread: is it possible to have whitelist specific for websites? I mean, on the web server I have website A and website B. Can I define an alias to access only website A and another one website B?

                                          1 Reply Last reply Reply Quote 0
                                          • KOMK
                                            KOM
                                            last edited by

                                            Of course. You can specify the Source for any NAT you create. Create an alias for your whitelist and then use it as the Source in your NAT rule.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.