Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to prevent users from LAN to know the external local WAN IP ?

    Off-Topic & Non-Support Discussion
    multi wan cloudflare external ip security
    8
    41
    7.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • chpalmerC
      chpalmer @johnpoz
      last edited by chpalmer

      @johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:

      What is the point of trying to hide your public IP from users of your network?? I am not understanding the use case here to be honest.

      +1

      Add me to that query.. :) sometimes you have to choose your battles..

      Triggering snowflakes one by one..
      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

      1 Reply Last reply Reply Quote 0
      • Sergei_ShablovskyS
        Sergei_Shablovsky @JKnott
        last edited by

        @JKnott said in How to prevent users from LAN to know the external local WAN IP ?:

        @Sergei_Shablovsky said in How to prevent users from LAN to know the external local WAN IP ?:

        For example even LAN user able to determine upstream ISPs router IP instead of our WAN IP - that would be great.

        You'd have to block traceroute to do that. But why do you consider the ISPs router to be an issue?

        I try to eliminate security hole:

        • minimize ability to determine main gate entry IPs from outside attackers;
        • minimize ability to determine main gate entry IPs from inside office lan (office secured WiFi, office open WiFi);

        Of course outside attackers may try to obtain access to ISPs infrastructure (client database leaks, phishing emails, etc.) or (most used way nowadays) by social engineering (phishing emails, SMS, Twitter/Messanger/Telegram for stuff with exploit links, etc).

        And earlier or sooner, the attacker get the main gate IPs.

        But anyway, time is money, and any wall behind the attacker goal - are good.

        Regarding Your question: if attacker DDoS-ing the ISP upstream appliance - this is ISPs security job and attack may be eliminate on ISPs level more effectively than on our main gate applience, agree?

        —
        CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
        Help Ukraine to resist, save civilians people’s lives !
        (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

        JKnottJ 1 Reply Last reply Reply Quote 0
        • Sergei_ShablovskyS
          Sergei_Shablovsky @stephenw10
          last edited by

          @stephenw10 said in How to prevent users from LAN to know the external local WAN IP ?:

          Send all your traffic over a tunnel to some IP you don't mind them finding. That's pretty much the only thing you can do.

          Steve
          Thank You Steve!

          I know about this ability but because keeping tunnel mean extra loading for hardware and lowering the overall bandwidth - I wrote to forum trying to find another way :)

          —
          CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
          Help Ukraine to resist, save civilians people’s lives !
          (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

          1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott @Sergei_Shablovsky
            last edited by

            @Sergei_Shablovsky said in How to prevent users from LAN to know the external local WAN IP ?:

            I try to eliminate security hole:

            minimize ability to determine main gate entry IPs from outside attackers;
            minimize ability to determine main gate entry IPs from inside office lan (office secured WiFi, office open WiFi);

            Of course outside attackers may try to obtain access to ISPs infrastructure (client database leaks, phishing emails, etc.) or (most used way nowadays) by social engineering (phishing emails, SMS, Twitter/Messanger/Telegram for stuff with exploit links, etc).

            Better put your tin foil hat on. You have nothing to worry about in that respect. It's the ISPs responsibility to protect their network. Hiding it from your users will accomplish nothing.

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
            • Sergei_ShablovskyS
              Sergei_Shablovsky @johnpoz
              last edited by Sergei_Shablovsky

              @johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:

              What is the point of trying to hide your public IP from users of your network?? I am not understanding the use case here to be honest.

              Thank You John for kindly reply and efforts to understanding my needs!

              Primary the topic mean hiding (or making very sophisticated to determine) from attacker external IPs of main gate from both side external and internal from doing the most used types of attacks like DDoS, DNS amplification, etc.

              For example Incoming RST-packets detecting to prevent DNS-amplification/Malicious Activity Abuse attacks.
              How You work with this type of attack?

              When You keep all Your business/services in a cloud, - this not an issue because cloud SaaS provider (Amazon, DigitalOcean, Google, Akamai, etc...) doing all protection job for You. Just pay the price. Thousands of $USD.
              But anyway you need to extra alarm work during attack to reconfigure infrastructure.

              But here we all have pfSense as software installed on real hardware, more or less powerful. And we all are obligation to keep all services working well 24/7/365.

              So due this we need to take all possible efforts to prevent attacks and secure our clients as much as possible.

              For example, the cost of DDoS-ing nowadays are from $20 / hour to $2-5k / hour depend on type of attack. And how much Your client lost for 1 hour of all its services (public we, warehouse databases, emails, survival equipment, climate control, power control,...) are down?
              Now there are no any solution from DDoS attacks rather than switch to failover uplink. If You have it already, of course.

              Thinking this manner about hospitals, medicine clinics with a lot of blood pumps, heart support devices....

              Most of users here on forum are quite away from this so-called “enterprise” questions. But only due the moment that really happened with them!

              If 70% of ordinary users on this forum not thinking about things like DNS amplification not mean this attack not exist at all.

              P.S. Example: Easy way to create attack vector by create gmail address -> register on this forum,-> look at this tread https://forum.netgate.com/topic/51312/show-your-pfsenses-thread-bandwidth-warning -> determine the real users with most explained hardware/software setup -> find in LinkedIn, FB company where this person work -> try to go inside and dump some sensitive databases -> obtain real IPs of entry -> prepare DDoS attack -> send email with proposition to pay by crypto -> make DDoS if payment not make.
              $2,000-10,000 USD is not a big amount for business, compare to 3-7 days of all it’s online-oriented services are down and profit lost due this.
              I think this criminal way is easy for understanding even someone are student in tech college. It’s reality. And no one ISP protect You against this, just switch off on a time of attack.

              Another one example: forum user not only show his wan IPs, but pfSense Device ID and much more https://forum.netgate.com/topic/139433/resolved-pfsense-hangs-when-wan-is-unstable-or-lost

              This is only one example how people not care about security. And I really not understand why doing this.

              —
              CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
              Help Ukraine to resist, save civilians people’s lives !
              (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

              1 Reply Last reply Reply Quote 0
              • Sergei_ShablovskyS
                Sergei_Shablovsky @JKnott
                last edited by Sergei_Shablovsky

                @JKnott said in How to prevent users from LAN to know the external local WAN IP ?:

                @Sergei_Shablovsky said in How to prevent users from LAN to know the external local WAN IP ?:

                I try to eliminate security hole:

                minimize ability to determine main gate entry IPs from outside attackers;
                minimize ability to determine main gate entry IPs from inside office lan (office secured WiFi, office open WiFi);

                Of course outside attackers may try to obtain access to ISPs infrastructure (client database leaks, phishing emails, etc.) or (most used way nowadays) by social engineering (phishing emails, SMS, Twitter/Messanger/Telegram for stuff with exploit links, etc).

                Better put your tin foil hat on.

                Nice suggestion. :) But better to be serious in this case.

                You have nothing to worry about in that respect. It's the ISPs responsibility to protect their network. Hiding it from your users will accomplish nothing.

                May be You newer going under attacks: only one thing that 99% of local ISP in any country doing - is just send You abuse email and after 30min-2h of channel to upstream appliance are overhead -> blackholing all requests to Your IPs.

                You may only sitting and waiting....

                And after a You never receive money compensation for “losing profit because service not given to a You from ISP side” and pay a lot for lawyers to proofing the issue.

                Live in reality :) Only a huge business able to win law battles. Other businesses may resolve security / attacks issues themselves.

                So better to focus on topic, ok, transform it to “”How to make impossible of sophisticated to know real main gate IPs from inside office lan”
                That's ok ok foil hat still needed? ;)

                —
                CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                Help Ukraine to resist, save civilians people’s lives !
                (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                1 Reply Last reply Reply Quote 0
                • G
                  gcu_greyarea
                  last edited by

                  On WAN block all incoming traffic.
                  On LAN block all outgoing traffic.

                  Set up a proxy server and install certificates on all you clients.

                  Chose an ISP that offers a proxy server.

                  Point your Proxy server to the ISP's upstream Proxy.

                  Alternative:
                  Purchase a VPS somewhere. Built a tunnel to that VPS and send all the internet traffic through the tunnel.

                  If your security needs are really that strict spending a few $$$ on a VPS shouldn't break the bank...

                  Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    Sorry dude you can not HIDE your public IP from your users...Without tunnel them to some other endpoint

                    It is not possible..As stated already if you let them talk from it to the internet - then there a bajillion ways.

                    But sounds like your wanting to hide your IP from where you go to... This is the case then use proxy/vpn... If you don't want pfsense.org knowing your IP, then that is vpn or proxy. But can promise you users will have issues with being blocked... Many sites block such access - especially forums.. Because people hiding their IPs are normally spammers!

                    If your concerned with ddos mitigation, then use a service that provides it.. Every major ISP provides this service - at a COST!! Or get your own IPs, and use a service that can route your traffic through them... At work we use these guys

                    https://www.netscout.com/arbor-ddos

                    If an attack is detected against any our public IP space, we can reroute that network through their network before it gets to us, they mitigate the attack traffic. It ain't cheap ;)

                    Your only possible solution is vpn.. Be it you use a service or roll your own. This hides IP from your own users, it also hides your IP from destination.. But it comes with its own issues. This is the only ma an pa type shop sort of solution.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    JKnottJ Sergei_ShablovskyS 2 Replies Last reply Reply Quote 0
                    • Sergei_ShablovskyS
                      Sergei_Shablovsky @gcu_greyarea
                      last edited by

                      @gcu_greyarea said in How to prevent users from LAN to know the external local WAN IP ?:

                      On WAN block all incoming traffic.
                      On LAN block all outgoing traffic.

                      Set up a proxy server and install certificates on all you clients.

                      Chose an ISP that offers a proxy server.

                      Point your Proxy server to the ISP's upstream Proxy.

                      Alternative:
                      Purchase a VPS somewhere. Built a tunnel to that VPS and send all the internet traffic through the tunnel.

                      If your security needs are really that strict spending a few $$$ on a VPS shouldn't break the bank...

                      Ok. I just try to find another way, let’s say, I open to learn ;)

                      ISP here are not stable due a couple of reasons, so VPS or even collocation - great way.

                      Thank You for efforts! ;)

                      —
                      CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                      Help Ukraine to resist, save civilians people’s lives !
                      (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @johnpoz
                        last edited by

                        @johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:

                        then there a bajillion ways

                        I thought it was closer to a gazillion. 😉

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Yeah, if you allow users behind the firewall to connect out then they can trivially find the IP they are connecting from.

                          The only thing you can do is change that IP to something else using a tunnel or proxy.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • Sergei_ShablovskyS
                            Sergei_Shablovsky @johnpoz
                            last edited by

                            @johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:

                            Sorry dude you can not HIDE your public IP from your users...Without tunnel them to some other endpoint

                            It is not possible..As stated already if you let them talk from it to the internet - then there a bajillion ways.

                            I understand that but asking here, because hope that someone suggest me another way, than VDS/VPS. :)
                            I open to learn.

                            But sounds like your wanting to hide your IP from where you go to... This is the case then use proxy/vpn... If you don't want pfsense.org knowing your IP, then that is vpn or proxy. But can promise you users will have issues with being blocked... Many sites block such access - especially forums.. Because people hiding their IPs are normally spammers!

                            I know that. Last 2-3 years a lot of people start to care about privacy much more and start blocking cookie, pop ups, js, using anonymizes, VPN services, etc. But this impact on websites coding, frontend of services coding,... forums...
                            For example a lot of journalists (even in US, not only in small countries in 3rd world) need to hide their IPs, security and forensic pro, etc...
                            New world become with a new types of attacks and a new type of defense.

                            If your concerned with ddos mitigation, then use a service that provides it.. Every major ISP provides this service - at a COST!! Or get your own IPs, and use a service that can route your traffic through them... At work we use these guys

                            https://www.netscout.com/arbor-ddos

                            Thank You for kindly suggestion!

                            I repeat another one time: technically not possible to against the DDoS attack on Your IPs, only pull Eth jack off ;)
                            No one ordinary local ISP able to against 10G - 20G traffic come to Your Eth port.

                            Because of this CloudFlare exist. But CloudFlare (or any other company, Amazon, DigitalOcean,...) only able to protect You if DDoS point on Your FQDN.
                            But if attack pointed on Your real main gate IPs - You would have only one way: sitting and smoking great cigars from Cuba. ;)

                            If an attack is detected against any our public IP space, we can reroute that network through their network before it gets to us, they mitigate the attack traffic. It ain't cheap ;)

                            This work only attack point on FQDN, but if attack pointed on Your real main gate IPs - nothing to do with this :)

                            Your only possible solution is vpn.. Be it you use a service or roll your own. This hides IP from your own users, it also hides your IP from destination.. But it comes with its own issues. This is the only ma an pa type shop sort of solution.

                            Thank You for time and efforts to understanding my point.

                            As we see, VPS/VDS on a very fast fiber-connected DC able to mask/hide real IPs of main gate...

                            Thank You all !!!

                            —
                            CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                            Help Ukraine to resist, save civilians people’s lives !
                            (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by johnpoz

                              @Sergei_Shablovsky said in How to prevent users from LAN to know the external local WAN IP ?:

                              This work only attack point on FQDN, but if attack pointed on Your real main gate IPs - nothing to do with this :)

                              Huh? Has zero to do with what fqdn might point to an IP.. We advertise what networks are used, the actual route is changed for network 6.15.0.0/16 as an example.

                              We have multiple networks routed to our connections in our DCs - multiple customers using different networks, /24s for example.. These routes are advertised via bgp to the internet...

                              So no dns record pointing to an IP has zero to do with the mitigation of such volumetric ddos attack.

                              I suggest you take a look at how such a service I linked to works.

                              But no such services don't work for small ma and pop setups where the ISP gives you IP address X to work with..

                              You trying to hide your IP is not a security anything - security through obscurity doesn't fix the actual problem.. Its trying to hide your head in the sand hoping the bad guy doesn't find you.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              Sergei_ShablovskyS 2 Replies Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by stephenw10

                                Yeah, that^. Works great in that sort of situation... if you are willing to pay for it.

                                Not really possible for 5 static IPs at your office though. Only the ISP can do anything there.

                                See my earlier 'use a tunnel' comment. 😉

                                Steve

                                Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by

                                  ^ exactly... The only solution to "hide" for a ma and pop setup is vpn service or proxy... But that doesn't actually fix the problem... Its just trying to hide.. If they get your IP, they still can ddos you...

                                  This is why you need to work with your ISP when your such a small fish.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by stephenw10

                                    There are advantages to dynamic IPs. Not many but this is one.

                                    1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator
                                      last edited by johnpoz

                                      Maybe if your home user and you don't want some script kiddie from dosing you to keep you from playing a game you beat him in or something.

                                      Just playing wack-a-mole at this point. A vpn prob good suited for something like that, hiding your IP from the game server so billy can't knock you off the game when you start kicking his ass. As long as the game server doesn't block vpn - which they prob do ;)

                                      If your trying to run a business, and your worried about ddos then really the correct solution is to get with your ISP about ddos protection.. Any major isp you get your connection from will offer ddos mitigation services, be it as a pay you go option or as an insurance sort of option you buy, etc.. They will provide you with a specific threat number to call if your under attack, etc. etc..

                                      These are all things you have to take into account as your company grows and your connection becomes vital to the business, and not just your workers shopping amazon on their free time ;) on your $100 a month "business line" ;)

                                      Here is the thing - none of its free! Thinking your going to find some solution with a 20$ a month vpn service is just plain nonsense..

                                      If your wanting to run with the big dogs, going to have to learn how to piss in the tall grass ;)

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                      Sergei_ShablovskyS 1 Reply Last reply Reply Quote 1
                                      • G
                                        gcu_greyarea
                                        last edited by gcu_greyarea

                                        So we went all the way - from "hiding WAN IP from internal users" to "protecting an enterprise from DDOS".

                                        And we want all of that for free :)

                                        If you cannot afford to host you application/website with one of the large providers you could still try this.

                                        Rent a small VPS. Buy sufficient bandwidth and CPU to run a reverse proxy...

                                        Connect to you VPS via VPN. Run all your public facing websites or application front-ends off the VPS...

                                        Do the processing and Databases etc at home.

                                        If you VPS gets attacked - switch over to another one...

                                        And yes, there will be latency and costs of some sort.

                                        Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by johnpoz

                                          And yup, again going to say it again.

                                          If your wanting to run with the big dogs, going to have to learn how to piss in the tall grass ;)

                                          Hey I plugged in the switch and it worked.. I'm a network engineer ;)

                                          If I could just keep everyone from knowing my IP they couldn't ddos me <rolleyes>

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                          Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                                          • Sergei_ShablovskyS
                                            Sergei_Shablovsky
                                            last edited by

                                            @JKnott said in How to prevent users from LAN to know the external local WAN IP ?:

                                            @johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:

                                            then there a bajillion ways

                                            I thought it was closer to a gazillion. 😉

                                            @JKnott said in How to prevent users from LAN to know the external local WAN IP ?:

                                            @johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:

                                            then there a bajillion ways

                                            I thought it was closer to a gazillion. 😉

                                            You are surrender! :)

                                            —
                                            CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                            Help Ukraine to resist, save civilians people’s lives !
                                            (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.