Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    stop pfsense showing as route

    Scheduled Pinned Locked Moved Firewalling
    29 Posts 3 Posters 2.6k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      chrisjmuk
      last edited by

      Done that, no luck. i think it must be somewhere else or a different option.

      1 Reply Last reply Reply Quote 0
      • C Offline
        chrisjmuk
        last edited by

        would it be this?

        https://phil.lavin.me.uk/2013/04/how-to-disable-icmp-redirects-in-pfsense/

        1 Reply Last reply Reply Quote 0
        • NogBadTheBadN Offline
          NogBadTheBad
          last edited by

          Your ICMP block rule is at the top isn't it ?

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          1 Reply Last reply Reply Quote 0
          • C Offline
            chrisjmuk
            last edited by chrisjmuk

            Yes very top

            Firewall Rules Edit.png

            1 Reply Last reply Reply Quote 0
            • NogBadTheBadN Offline
              NogBadTheBad
              last edited by

              Where are you trying to block traceroutes from, if its your local network out the rule needs to be on the LAN interface.

              Andy

              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

              1 Reply Last reply Reply Quote 0
              • C Offline
                chrisjmuk
                last edited by

                Its WAN, its a public firewall for public IP's so has a WAN IP

                1 Reply Last reply Reply Quote 1
                • GertjanG Offline
                  Gertjan
                  last edited by

                  I saw 'somewhere' that trace route could be ICMP based.
                  Normally, it's UDP based.

                  @chrisjmuk : you want to hide your router from LAN based clients ? 😨

                  You can not fear attacks from the inside. Unless you created that situation.
                  Only trusted clients should be connected to the LAN interface.
                  Everybody else goes on a another LAN network, called OPTx where x is a number.
                  These guys shouldn't be able to connect to pfSense, the GUI (port 443 or 80). They can just use '53', '67', '68' and '123' (if you want).
                  Attacks from the outside isn't possible. pfSense, out of the box, is rock solid.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • NogBadTheBadN Offline
                    NogBadTheBad
                    last edited by NogBadTheBad

                    https://superuser.com/questions/355486/what-is-the-range-of-ports-that-is-usually-used-in-the-traceroute-command

                    Forgot it could use UDP.

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    1 Reply Last reply Reply Quote 0
                    • C Offline
                      chrisjmuk
                      last edited by

                      Thank, but that doesnt really help me blocking the trace, i set to udp and ports 33434 to 33534 and no luck, someone must of solved this issue before. surely

                      1 Reply Last reply Reply Quote 0
                      • NogBadTheBadN Offline
                        NogBadTheBad
                        last edited by

                        Do you have any floating rules, by default everything is blocked into the WAN interface.

                        Andy

                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                        1 Reply Last reply Reply Quote 0
                        • NogBadTheBadN Offline
                          NogBadTheBad
                          last edited by

                          https://www.ultratools.com/tools/traceRoute

                          Screenshot 2020-06-15 at 14.06.26.png

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          1 Reply Last reply Reply Quote 0
                          • C Offline
                            chrisjmuk
                            last edited by chrisjmuk

                            whats the entire port range you have? i have this as i said (i know rule is currently disabled in the screenshot but doesnt work enabled)

                            Firewall Rules Edit - udp.png

                            NogBadTheBadN 1 Reply Last reply Reply Quote 0
                            • NogBadTheBadN Offline
                              NogBadTheBad @chrisjmuk
                              last edited by

                              @chrisjmuk

                              Post a screenshot of your WAN rules, as I said by default everything is blocked inbound on the WAN.

                              Andy

                              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                              1 Reply Last reply Reply Quote 0
                              • C Offline
                                chrisjmuk
                                last edited by

                                yep just posted, because its all public IP's it cant work as like that, if i block ICMP on everything in WAN the public IP's will no longer ping, so just setting to the firewall ip itself.

                                NogBadTheBadN 1 Reply Last reply Reply Quote 0
                                • NogBadTheBadN Offline
                                  NogBadTheBad @chrisjmuk
                                  last edited by

                                  @chrisjmuk said in stop pfsense showing as route:

                                  yep just posted, because its all public IP's it cant work as like that, if i block ICMP on everything in WAN the public IP's will no longer ping, so just setting to the firewall ip itself.

                                  All your WAN rules.

                                  Andy

                                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                  1 Reply Last reply Reply Quote 0
                                  • C Offline
                                    chrisjmuk
                                    last edited by

                                    i cant because of sensitive information. in the firewall and with ip's

                                    1 Reply Last reply Reply Quote 0
                                    • NogBadTheBadN Offline
                                      NogBadTheBad
                                      last edited by

                                      Following this is the only thing I can suggest:-

                                      https://docs.netgate.com/pfsense/en/latest/book/firewall/troubleshooting-firewall-rules.html

                                      Andy

                                      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                      1 Reply Last reply Reply Quote 0
                                      • C Offline
                                        chrisjmuk
                                        last edited by

                                        No luck, just blocked all UDP on the firewall ip and still traces.

                                        1 Reply Last reply Reply Quote 0
                                        • GertjanG Offline
                                          Gertjan
                                          last edited by

                                          Still don't know what trace-route you want to block.
                                          From the inside, LAN, to, the outside ?
                                          The other way around ?

                                          No "help me" PM's please. Use the forum, the community will thank you.
                                          Edit : and where are the logs ??

                                          1 Reply Last reply Reply Quote 0
                                          • C Offline
                                            chrisjmuk
                                            last edited by

                                            so tracing from outside of our network into a public ip in our DC so for example on the route

                                            BGP Router
                                            CORE Switch
                                            pfSense Firewall ( Public IP)
                                            Server (Public IP)

                                            trying to block the pfSense public ip from being traced, i can stop the normal icmp ping protocal but not the trace or an MTR

                                            pfSense on WAN needs to be a public IP and our core switch ip routes to it to get route outwards to our BGP switch to know where its going as its in the BGP config, would not work as an internal ip because it has no route to the world.

                                            GertjanG 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.