Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    stop pfsense showing as route

    Scheduled Pinned Locked Moved Firewalling
    29 Posts 3 Posters 2.6k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN Offline
      NogBadTheBad
      last edited by

      https://www.ultratools.com/tools/traceRoute

      Screenshot 2020-06-15 at 14.06.26.png

      Andy

      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

      1 Reply Last reply Reply Quote 0
      • C Offline
        chrisjmuk
        last edited by chrisjmuk

        whats the entire port range you have? i have this as i said (i know rule is currently disabled in the screenshot but doesnt work enabled)

        Firewall Rules Edit - udp.png

        NogBadTheBadN 1 Reply Last reply Reply Quote 0
        • NogBadTheBadN Offline
          NogBadTheBad @chrisjmuk
          last edited by

          @chrisjmuk

          Post a screenshot of your WAN rules, as I said by default everything is blocked inbound on the WAN.

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          1 Reply Last reply Reply Quote 0
          • C Offline
            chrisjmuk
            last edited by

            yep just posted, because its all public IP's it cant work as like that, if i block ICMP on everything in WAN the public IP's will no longer ping, so just setting to the firewall ip itself.

            NogBadTheBadN 1 Reply Last reply Reply Quote 0
            • NogBadTheBadN Offline
              NogBadTheBad @chrisjmuk
              last edited by

              @chrisjmuk said in stop pfsense showing as route:

              yep just posted, because its all public IP's it cant work as like that, if i block ICMP on everything in WAN the public IP's will no longer ping, so just setting to the firewall ip itself.

              All your WAN rules.

              Andy

              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

              1 Reply Last reply Reply Quote 0
              • C Offline
                chrisjmuk
                last edited by

                i cant because of sensitive information. in the firewall and with ip's

                1 Reply Last reply Reply Quote 0
                • NogBadTheBadN Offline
                  NogBadTheBad
                  last edited by

                  Following this is the only thing I can suggest:-

                  https://docs.netgate.com/pfsense/en/latest/book/firewall/troubleshooting-firewall-rules.html

                  Andy

                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                  1 Reply Last reply Reply Quote 0
                  • C Offline
                    chrisjmuk
                    last edited by

                    No luck, just blocked all UDP on the firewall ip and still traces.

                    1 Reply Last reply Reply Quote 0
                    • GertjanG Offline
                      Gertjan
                      last edited by

                      Still don't know what trace-route you want to block.
                      From the inside, LAN, to, the outside ?
                      The other way around ?

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • C Offline
                        chrisjmuk
                        last edited by

                        so tracing from outside of our network into a public ip in our DC so for example on the route

                        BGP Router
                        CORE Switch
                        pfSense Firewall ( Public IP)
                        Server (Public IP)

                        trying to block the pfSense public ip from being traced, i can stop the normal icmp ping protocal but not the trace or an MTR

                        pfSense on WAN needs to be a public IP and our core switch ip routes to it to get route outwards to our BGP switch to know where its going as its in the BGP config, would not work as an internal ip because it has no route to the world.

                        GertjanG 1 Reply Last reply Reply Quote 0
                        • GertjanG Offline
                          Gertjan @chrisjmuk
                          last edited by Gertjan

                          @chrisjmuk said in stop pfsense showing as route:

                          trying to block the pfSense public ip from being traced,

                          That public IP is assigned to you - and known (to the public).
                          You can't hide an IP.
                          You can make it look like a black hole, by not answering to any out of state requests, which is what pfSense does when you install, it.

                          The last router in front of pfSense knows what IP - the one used by you - is on what interface. If that one - yours - isn't replying when using trace route, they - the one that traces - still knows the path to you system up until the last router.

                          If you asked the organisation that gave you your IP's to remove them - that is : remove them from their routing tables, then your IP would vanish from the net, that's for sure. As will your entire connection to the net.

                          Btw : the trace route will end with your WAN IP, because the upstream router was telling so. It will not go beyond pfSense, because it also works as a firewall.
                          This (should be valid) if the IP's are RFC1918 - or public ones.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          1 Reply Last reply Reply Quote 0
                          • C Offline
                            chrisjmuk
                            last edited by

                            Just thinking we can blackhole the pfsense ip on incomming connections on our BGP configs, that way it wont be hit from outside but allowed on inside our network.

                            1 Reply Last reply Reply Quote 0
                            • GertjanG Offline
                              Gertjan
                              last edited by

                              Or, as you stated earlier : what about using RFC1918 instead of using a public IP ?
                              If the network doesn't need to be accessible from the outside, hiding it from the outside would because easier.

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.