Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cannot connect to internet (firewall rules)

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 3 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @noaboa
      last edited by

      @noaboa said in Cannot connect to internet (firewall rules):

      So wich net would I use then?

      To get to the "internet" that would be ANY... Unless your wanting to create rules for every possible IP on the internet ;)

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      N 1 Reply Last reply Reply Quote 0
      • N
        noaboa @Gertjan
        last edited by

        @Gertjan

        we got the firewall from school and they already configured some stuff so that it's a reall life scenario they did any any rules and told us that's wrong change it that's part of the challenge.

        well we can't choose what we want to do. They just give us the projects and we have to write the documentation and set up the virtual lab/infrastructure as we planned it.

        GertjanG 1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @noaboa
          last edited by

          @noaboa said in Cannot connect to internet (firewall rules):

          so that it's a reall life scenario they did any any rules and told us that's wrong change it that's part of the challenge.

          Ok. lol.
          Some one did a good job after all ^^

          Reset the thing to default.
          This wall take care of all other tricky issues that would take a lot of time to find.
          Go discover what interfaces, network ports, are. How firewall rules are handled - see pfSense full manual, there is some really need-to-know info there.
          When all ok, draw up a plan, connect to pSense, and set it up by a one to one step.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          N 1 Reply Last reply Reply Quote 0
          • N
            noaboa @johnpoz
            last edited by

            @johnpoz

            so a new rule

            source: any
            destination: wan
            port : any

            or what do you mean?

            Still that does not resolve my problem.

            I want to have rules which allow only some ports like the ones I created in LAN and only allow those into the internet and block everything else. Same for rules from DMZ -> LAN should also only allow the stuff I need and block the rest.

            GertjanG 1 Reply Last reply Reply Quote 0
            • N
              noaboa @Gertjan
              last edited by

              @Gertjan

              I should know the basics, we learnd that in school but it's not beahving as I would expect it to. That's why I'm asking what I'm missing.

              They didn't change tricky stuff to drive us crazy just the anyrules as if some stupid guy did this who had no idea what he was doing.

              But still are my rules wrong? what am I missing?

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @noaboa
                last edited by Gertjan

                @noaboa said in Cannot connect to internet (firewall rules):

                so a new rule

                Which interface ?

                @noaboa said in Cannot connect to internet (firewall rules):

                source: any
                destination: wan
                port : any

                For starters, make it look like this :

                875084f9-b803-44e2-9f97-9b790ae0954f-image.png

                The first rule is a menu option - it's build automatically.
                The second rules is the one you have to make - it's the default rule.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                N 1 Reply Last reply Reply Quote 0
                • N
                  noaboa @Gertjan
                  last edited by

                  @Gertjan

                  I kind of don't understand why we have three tabs for the rules. Is it just for filtering and nice display?
                  Or when do I put one in WAN, LAN or DMZ?

                  The first rule is a menu option - it's build automatically.

                  yeah I know so that I cant lock myself out of the webinterface. right?

                  The second rules is the one you have to make - it's the default rule.

                  Well that works of course but we can't have any any rules. only specific rules

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    Well the internet is ANY so not sure how your going to allow "internet" without an ANY rule as dest.. Unless your going to create rules to only allow access to the specific IPs on the internet.

                    But the rule/rules you create wouldn't really need to be a true any any... you would have a source network, ie your lan. You can set specific destination ports say only 80/443 for example. But unless your going to create rules to allow traffic to every possible IP your going to talk to the dest IP/Network would need to be any.

                    Tabs - you mean your interfaces, and floating?

                    You place rules on the specific interfaces for the traffic that will enter that interface. Floating is a special case where you can do specific things, like filter on outbound traffic, or apply rules to more than one interface.

                    Normally that tab doesn't need to be used.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    N 1 Reply Last reply Reply Quote 0
                    • N
                      noaboa @johnpoz
                      last edited by

                      @johnpoz

                      Well internet is any but I can still say only dns, http and https and that not into the dmz how would I do that?

                      And for what are LAN net and WAN net then used for?

                      Okay got that with the tabs.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        exactly you can limit what ports, sure dns (tcp/udp 53) and http https sure.

                        Normally clients on the lan would just ask pfsense for dns.. So you would need a rule to allow dns to pfsense IP.. You wouldn't need to allow dns to some outside IP unless your client was going to be sending specific queries to some outside nameserver. Which you could limit to IP of those nameservers.

                        the lan and wan tabs would be used to put rules on those interfaces.. Not sure how that isn't obvious?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        N 1 Reply Last reply Reply Quote 0
                        • N
                          noaboa @johnpoz
                          last edited by

                          @johnpoz

                          Okay great thanks. Yeah but they want us to have a linux server that does dhcp, dns and some other stuff so I have to do it that way.

                          So for example if I a server in the dmz must connect to the dns server in the lan then I would but LAN net as destination and https in the internet but not in the LAN I put WAN net as destination right?

                          Mostly I worked with ipfire and there you just have a list of all rules in one place so I got confused also ubiquiti has 6 tabs with lan in, lan out and so on

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            @noaboa said in Cannot connect to internet (firewall rules):

                            n the LAN I put WAN net as destination right?

                            Why would you think you need to put wan net as destination? Is there something in the wan network you need to talk to from lan?

                            You could put specific IP as dest if you know it. But keep in mind the any rule would allow access to any IP be it in your wan or dmz or where ever.

                            If you don't want say lan to talk to dmz netnwork, then you would put a block rules above the any rule in lan.

                            You do not need return traffic rules, those are handled by state that is created.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            N 1 Reply Last reply Reply Quote 0
                            • N
                              noaboa @johnpoz
                              last edited by noaboa

                              @johnpoz

                              Why would you think you need to put wan net as destination? Is there something in the wan network you need to talk to from lan?
                              because I don't want it to be able to talk to stuff in the lan but if I say any wouldn't allow it to talk to lan if it's https 443?

                              It's for Seafile Server which is going to be in the DMZ and the client on the phone or pc connects over https. And I don't want it to access the lan

                              If you don't want say lan to talk to dmz netnwork, then you would put a block rules above the any rule in lan.

                              Ahh makes sense.

                              You do not need return traffic rules, those are handled by state that is created.

                              Ahh right how can I forget.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.