• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

WebGUI access on all interfaces ?

General pfSense Questions
5
15
2.0k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    chudak
    last edited by Jun 15, 2020, 7:26 PM

    I have 2 physical interfaces and OpenVPN server, say
    LAN 192.168.90.1
    WIFI 192.168.70.1
    OpenVPN 192.168.20.1

    and DDNS name <blah.blah.blah>

    I can access my router WebGUI via all of them.

    What are the best practices to manage access to WebGUI access ?

    One use case I am interested in - disallow all access to WebGUI on one interface, say WIFI?

    Thx

    G 1 Reply Last reply Jun 16, 2020, 8:41 AM Reply Quote 0
    • S
      sh500
      last edited by Jun 16, 2020, 8:18 AM

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • R
        Rico LAYER 8 Rebel Alliance
        last edited by Jun 16, 2020, 8:20 AM

        https://docs.netgate.com/pfsense/en/latest/firewall/restrict-access-to-management-interface.html

        -Rico

        1 Reply Last reply Reply Quote 1
        • G
          Gertjan @chudak
          last edited by Jun 16, 2020, 8:41 AM

          @chudak said in WebGUI access on all interfaces ?:

          I can access my router WebGUI via all of them.

          That's NOT default.
          pfSense, as it came out of the box, only accept WebGUI access from its LAN interface. All interfaces have no rules so the default firewall policy kicks in : block all **.

          The WebGUI is running on port 80 or port 443 - only you know which one it is, or what port other number it is.
          The destination will be the 'pfSense' IP of that interface.
          Like, in your case, use the alias "Wifi_address".

          On the interface where you want to block, put a block rule on top, TCP, port number, destination Wifi_address.
          Leave the rest at default, and Save, Validate.

          ** maybe an exception : when you use the OpenVPN server wizard, it will put a pass-all firewall rule on yhe OpenVPN interface, thus permitting to access the WebGUI.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 1
          • R
            Rico LAYER 8 Rebel Alliance
            last edited by Jun 16, 2020, 9:22 AM

            Oh btw, you posted almost the same question here some days ago: https://forum.netgate.com/topic/154387/easy-way-to-restrict-webconfigurator-access-on-openvpn-only
            The concept is always the same, no matter if it is a wire Interface, Wifi, VLAN, virtual Interface like OpenVPN, Interface Group, ...

            -Rico

            G 1 Reply Last reply Jun 16, 2020, 10:06 AM Reply Quote 0
            • G
              Gertjan @Rico
              last edited by Jun 16, 2020, 10:06 AM

              @Rico said in WebGUI access on all interfaces ?:

              Oh btw, you posted

              I don't dare to look neither ask : I was answering there also ?
              My memory said that the same question was ask a couple of days ago.
              The answer wasn't clear ... ?

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • R
                Rico LAYER 8 Rebel Alliance
                last edited by Jun 16, 2020, 10:46 AM

                Your answer there was clear as crystal. 🙃

                -Rico

                G 1 Reply Last reply Jun 16, 2020, 10:54 AM Reply Quote 0
                • G
                  Gertjan @Rico
                  last edited by Jun 16, 2020, 10:54 AM

                  @Rico said in WebGUI access on all interfaces ?:

                  Your answer there was clear as crystal. 🙃

                  -Rico

                  Guess @chudak doesn't share that opnion.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • E
                    emammadov
                    last edited by Jun 16, 2020, 11:34 AM

                    Hi. You can create an alias of "pfsense ports" (such as webgui port, ssh and etc.), and the ip address of admins and create a floating rule and select the interfaces that you want to allow or disallow.

                    login-to-view

                    login-to-view

                    Elvin

                    C 1 Reply Last reply Jun 16, 2020, 4:36 PM Reply Quote 1
                    • C
                      chudak @emammadov
                      last edited by Jun 16, 2020, 4:36 PM

                      @emammadov

                      I like this suggestion

                      I added this rule:

                      login-to-view

                      And I don't see access disabled on WIFI net (19.168.70.1 in my case)

                      WTH ?

                      @Gertjan @Rico it was slightly different question :) appreciate your participation and contributions to the group! That's why I love open source!

                      1 Reply Last reply Reply Quote 0
                      • E
                        emammadov
                        last edited by Jun 16, 2020, 8:01 PM

                        Check "Apply the action immediately on match".

                        Elvin

                        1 Reply Last reply Reply Quote 0
                        • G
                          Gertjan
                          last edited by Jun 17, 2020, 5:31 AM

                          @chudak : @emammadov proposed a rule that blocks the access to the webgui of pfSense.
                          You forgot to copy half of all settings, and created a rule that blocks the access to any web site on planet earth.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          C 1 Reply Last reply Jun 17, 2020, 3:24 PM Reply Quote 0
                          • C
                            chudak @Gertjan
                            last edited by Jun 17, 2020, 3:24 PM

                            @Gertjan

                            You are right ! :)

                            It was test. I ended up with this rule:

                            login-to-view

                            1 Reply Last reply Reply Quote 0
                            • G
                              Gertjan
                              last edited by Jun 17, 2020, 3:42 PM

                              Close to perfect 👍

                              Instead of creating your own alais called pfSense - the one you forget to change when you change the IP of the LAN of pfSense == potential pitfall, use the alias that was designed for this "This firewall".

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              C 1 Reply Last reply Jun 17, 2020, 3:49 PM Reply Quote 0
                              • C
                                chudak @Gertjan
                                last edited by chudak Jun 17, 2020, 5:25 PM Jun 17, 2020, 3:49 PM

                                @Gertjan

                                This is interesting.
                                The reason I have alias called pfSense because it lists LAN addresses like 192.168.90.1 etc as well as DDNS addresses.

                                I did not see "This Firewall" blocking external DDNS IPs. Did you?

                                PS: Thinking about it I'd say it should block ANY IPs, maybe a good feature request ?

                                Thx

                                1 Reply Last reply Reply Quote 0
                                3 out of 15
                                • First post
                                  3/15
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.