Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block traffic/No routing between LANs on pfSense

    Scheduled Pinned Locked Moved Routing and Multi WAN
    15 Posts 3 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      Elrick75
      last edited by Elrick75

      Hi,

      Could you help me to create the other method that you mention please ?
      What are the parameters to use to create rfc1918 alias ? could you give me an screenshot of this alias to create it as well please ?

      After alias creation, does i need to create one or multiple rules ? in which section ? (Floating, WAN, VLAN_MY_LAN, VLAN_DMZ, VLAN_WIFI)
      Could you give me screenshot copy of the rule(s) in this case please ?

      About NTP, some devices from different subnet use it but NTP target address is pointing on internet.
      I do not have a ntp server on my lan's, so it doesn't block anything normally !?

      To have all parameters, you'll see below what rules/alias are present:

      • Interface list
        9a7cb193-a73e-4498-b979-29a44da81a65-image.png

      • I block two LANs on three that i have to have access to pfsense webgui for security reason.

      Alias
      0a430004-f723-4950-852a-5034bc4f6fbc-image.png

      Floating rules associated:
      11456b94-a976-4059-ab3a-822011f5f269-image.png

      • Port forward for Torrent
        f57b41c7-f773-4d7b-b867-467d2c5ad26f-image.png

      • Current WAN Rules
        3e691718-3642-493b-8cd0-9633697e673c-image.png

      • Current VLAN_My_LAN Rules (= LAN)
        82406ecf-7b8d-45cb-9b2f-d95708eb8e15-image.png

      • Current VLAN_DMZ (= OPT1)
        adf7c3a1-3b2a-4e57-b516-ea192e0d4468-image.png

      • Current VLAN_WIFI (= OPT2)
        b4e35f3c-d0fc-4139-be94-6a55dec03950-image.png

      I figure that your answer help me and many other person who need to do the same things.
      Many thanks in advance for your precious help :)

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        Here..

        rfcalias.png

        BTW - blocking bogon on your local networks is going to cause you nothing but grief... there is ZERO reason to block bogon on your local network.. What you think someone is going to connect to your network and start using bogon addresses?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 1
        • E
          Elrick75
          last edited by

          Thanks, aliases is created :)
          I disable bogon, sorry i was not aware about this, don't hesitate to advise if you find something strange into my setup.

          So i need to create just one Rules after with rfc1918 after ?
          Could you tell me in which tab does it be created ? in Floating tab, WAN, VLAN_MY_LAN, VLAN_DMZ or VLAN_WIFI?

          Coud you edit your rules to be sure to have all good parameters set properly ?

          42fbc24c-0fd8-4f24-b92f-f3b8bd9d7b0b-image.png

          Many Thanks.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            You create the rules on the interfaces you want.. Just making your setup look like a picture isn't the correct way.. The correct way is understanding what the rules are doing so you can determine what rules you need per your setup..

            You place the rules on the interface where the traffic would first enter pfsense.. If you don't want your 3 vlans to talk to each other than the block would need to be on all 3 of them..

            You could put rules on floating tab - but I highly suggest against that since you don't seem to understand basic concepts as of yet and rules placed there are for more complex uses.

            Rules are evaluated as traffic enters pfsense from that network, top down, first rule to trigger wins, no other rules are evaluated..

            So if you want to block opt1 from talking to lan, where do you think the "rules" would go..

            Also there is nothing in the rules I showed other than that info, if any special things had been set you would see the little gear symbol next to them.

            advancedrule.png

            Pretty much the rules as I posted them would go on EVERY interface.. Where you would just change out the test address, and test net for the interface you are putting them on. The rules are labeled as to what they specifically do.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 1
            • E
              Elrick75
              last edited by Elrick75

              Hello,

              I create one rule on VLAN_MY_LAN interface, but it doesn't seems good.
              I'm still able to ping VLAN_DMZ from VLAN_MY_LAN :(

              i try to add one rule on VLAN_DMZ and VLAN_WIFI, but it's remain the same.
              My setup is like this

              ff7ead0d-706d-4f2a-8ced-466e730035a9-image.png

              204e5ea0-70af-47a8-b501-47b3e8c96a58-image.png

              afcd26cf-59f0-4afd-9b15-88acbc239c4c-image.png

              9b03a471-d20b-49d3-8c16-e8bf4a9bd56f-image.png

              557671bd-5872-4656-bcbc-573dc45f06c5-image.png

              11bc67f9-3021-45b8-863a-2ae3c0f229b4-image.png

              What's wrong please ?

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                That is because your block rule is UNDER an allow rule... Again rules are evaluated TOP DOWN, first rule to trigger wins.. So no your block rule would never trigger.

                wrongorder.png

                And not sure what you think that nat nat rule is suppose to do?

                And if you move the block to above your allow, then how would you talk to pfsense for dns..

                When designing your rules - just think about your destination and then look at it rule from the TOP down, which rule matches first? This is the rule that will be used, any rules below a rule that matches will not be evaluated.

                So I want to ping IP in dmz.. Lets walk down you rules.

                1st anti lock, nope dest is NOT your my lan address, nor is it to port 443 or 80, so skipped
                2nd rule anything from my lan net to anywhere - well dmz fall into any (*) and its ipv4, and dest is also any.. So up allowed and rule matches.

                no other rules looked at.. So yeah you can ping something in your dmz.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 1
                • E
                  Elrick75
                  last edited by Elrick75

                  After change rule order, it works better.
                  The most restricitive rules need to be on top, the other after, integrate for next time.

                  My setup is like this:

                  b44a7a1c-6949-4eaa-a022-1868f2a0a935-image.png
                  c8fd6ee5-4f45-4e20-8c00-f89f3e5b14a9-image.png
                  910cefa0-597b-4734-813a-367938f8f567-image.png

                  About DNS, i'm still able to ping google from workstation in VLAN MY LAN or ping server in VLAN MY LAN from workstation in VLAN MY LAN.
                  From my understanding, all gateway use DNS resolver to make it possible? that's why it's still working?

                  I already created one rule in floating section, how these rules will be applied versus other rules in other LAN section ? does floating rule are upper than all other LAN section?

                  859e717a-0d8c-43f7-aa1a-336d6aa8303f-image.png

                  About Anti-Lockout Rule, it was present by default, i don't understand what does it do...
                  It seems to allow all traffic to VLAN MY LAN on http/https, but i dunno why.
                  Does it make sens to keep it?

                  Many thanks for your help

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    The antilock out rule makes sure you do not lock yourself out of the web gui.. or ssh so you can admin the firewall.

                    From my understanding, all gateway use DNS resolver to make it possible? that's why it's still working?

                    No that is not why is still working.. Look at your rules.. Your blocking all access to any rfc1918 address, if you correctly make the alias.. What is the IP your using for dns? If its pfsense IP say 192.168.1.1, then that rule wold block it.. So how would you ask pfsense for dns..

                    Now maybe your client has the IP cached for google, so it didn't have to ask dns to know what IP to ping.. That would be my guess.

                    And no you don't always put most restrictive on top.. It DEPENDS on what your wanting to do.. Again follow the order of the rules to figure out how they need to be ordered to do or block what your wanting to block or allow.

                    As to floating those rules are evaluated before rules on your interface, but they may or may not be "quick" it is all documented. I suggest you read over how rules are evaluated.

                    https://docs.netgate.com/pfsense/en/latest/firewall/firewall-rule-processing-order.html

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    E 1 Reply Last reply Reply Quote 1
                    • E
                      Elrick75 @johnpoz
                      last edited by

                      You are right...
                      With this rules, i'm not able to ping my own gateway when i am in VLAN_MY_LAN.
                      Even if all LANs was isolated, i was figuring that i would be able to ping each gateway when i was into this LAN...
                      Does i need to modify the reject rules related to be able to ping it ? or i need to create one more rules for it ?

                      For DNS, i have registered it in workstation IP setup, i add DNS IP manually, i think that why i was able to have DNS resolution without issue.

                      So i understand the rules that you added.
                      In Green, this rules allow you to ping the default gateway when you device is on the same lan, right ?
                      In Blue, this is to allow DNS request if a workstation is using the gateway as DNS in his IP setup, right ?

                      ed24ceb4-d93a-4aa2-8a83-e5688df6a66e-image.png

                      You put these rules before the rejected rules rfc1918 to be sure that they keep in count.
                      Could you tell me what is TEST address as Destination on both ? it's another alias ?
                      Is it possible to edit each rules to be sure to replicate it please ?

                      Best Regards.

                      1 Reply Last reply Reply Quote 0
                      • E
                        Elrick75
                        last edited by

                        Up, please advise :)

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          You are correct, and that is how they are labeled.

                          Green allows ping, which is labeled "Allow Ping Pfsense Address" even ;)

                          You put the rules above the rejected, because as I have stated multiple times rules are evaluate top down.. So yes if you want to ping it needs to be evaluated be a rule that says reject anything to any rfc1918 address ;)

                          There is nothing to replicate.. The info shown is exactly what you would need to set in the rule.. Don't touch anything else in the rule ;)

                          The Test address, is pfsense IP on the interface called Test.. in this case its 192.168.100.1 As to what test address or net are, those are the built in aliases for any interface you have on your pfsense. like lan net or lan address. So in my case address would be 192.168.100.1 and net would be 192.168.100.0/24

                          here
                          rulepng.png
                          interface.png

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 1
                          • E
                            Elrick75
                            last edited by

                            Many thanks for your help, it works fine.
                            You help me a lots.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.