Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    What do your firewall rules look like?

    Scheduled Pinned Locked Moved pfBlockerNG
    29 Posts 5 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Raffi_R
      Raffi_ @ex1580
      last edited by

      @ex1580 said in What do your firewall rules look like?:

      @Raffi_ For this to work you might also need to block use-application-dns.net in your DNS server to prevent DNS-over-HTTPS (DoH) from accidentally bypassing your DNS server. I feel trying to stop DoH entirely is futile, but preventing the accidental bypass like this is easy. This can easily be done in DNSBL or you can create a custom zone in your DNS advanced settings like below.

      server:
      local-zone: "use-application-dns.net" redirect
      local-data: "use-application-dns.net A 0.0.0.0"
      

      https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet

      I think I already have the prevent firefox DoH option in pfblocker. That is the main one I'm concerned with since it does that by default.

      1 Reply Last reply Reply Quote 1
      • E
        ex1580
        last edited by

        @billl Thanks! I looked into the groups when you first mentioned it and will keep it in mind next time I redo my rules! I didnt jump on it right way as it would be a big change from my rules for each interface. Looks nice though.

        1 Reply Last reply Reply Quote 0
        • billlB
          billl @ex1580
          last edited by

          @ex1580 said in What do your firewall rules look like?:

          server:
          local-zone: "use-application-dns.net" redirect
          local-data: "use-application-dns.net A 0.0.0.0"

          With blind trust, I have been using @jimp's recommendation of:
          local-zone: "use-application-dns.net" always_nxdomain
          though I have also seen @johnpoz using:
          local-zone: "use-application-dns.net" static

          Does it not matter what the parameter is, as long as it is not NOERROR?

          I'm curious about your local-data setting:
          local-data: "use-application-dns.net A 0.0.0.0"
          I haven't seen that one before ..

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            I am currently using

            local-zone: "use-application-dns.net" always_nxdomain

            This needs to return NX.. So this is the easiest method to do that.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 1
            • E
              ex1580
              last edited by

              Thanks @johnpoz ! NXDOMAIN is the optimal response however their website lists a few other options. I will update my documentation now. https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet

              1 Reply Last reply Reply Quote 0
              • E
                ex1580
                last edited by

                Are any of you using a port alias to filter outbound ports? I find that for incoming traffic it's a no-brainer to filter protocol, ports, and even geoip but outgoing is another story.

                I was looking around at port filtering recommendations and while I believe that it depends on what you need, and if I was being paid to do this at home and for friends and family would certainly track down every device and app, I see people posting things like "80, 443, and 21 are all you need outbound" which I find laughable. If I did that at home I think most of my stuff would stop working (but at least I would have a web browser to search for why).

                I recently got around to adding a "allowed_ports_outbound" alias to my rules that allow internet access (this is a default deny scenario) and I feel like once you get above port 1000 it's the wild west as far as each app and service wanting it's own thing. Take for instance if I wanted to allow Zoom, Google Meet, and Skype. Sure 80, and 443 are the base requirement but give them an inch and next thing you know they want TCP nearly everything (looking at you Skype). That doesnt even take into account smart devices.

                So, as I was going from "allow all ports" to something which will make no difference but may someday make it easier to block a port, I decided to carefully filter below 1000 then not so much above that number, just knocking out a chunk of IRC in the 666X range per SANS recommendations. It's been good so far! What are you doing?

                a4217af6-6d4c-4180-8be9-e7701ab85ff1-image.png

                billlB 1 Reply Last reply Reply Quote 0
                • billlB
                  billl @ex1580
                  last edited by

                  @ex1580 yeah, I think you'd go crazy trying to keep track above 1024.
                  Thanks for the tip about 666X - I need to look into that!

                  Here are my rules for a standard user device VLAN:
                  userVlanRules.png
                  and here are my rules for the VLAN I use for work:
                  powerUserVlanRules.png

                  E 1 Reply Last reply Reply Quote 0
                  • E
                    ex1580 @billl
                    last edited by ex1580

                    @billl Looks good, thanks for sharing! In regard to your TCP port 547 for DHCPv6 this may be helpful (replace with your management address of course): https://192.168.0.1/status.php#FirewallpfFirewallRules

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      You don't need any rules for dhcp.. They are auto enabled when you enable dhcp and are hidden.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      billlB 1 Reply Last reply Reply Quote 0
                      • billlB
                        billl @johnpoz
                        last edited by

                        @ex1580 @johnpoz Thank you both!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.