Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfblocker Permit Inbound Confusion

    Scheduled Pinned Locked Moved pfBlockerNG
    24 Posts 6 Posters 3.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      blackops786187
      last edited by

      Hi Guys. Thanks for the replies. Ill try and answer everyones question. Im still a noob at networking and pfsense. There is no double NAT. This is my setup visualised as a diagram. DHCP assigns the pfsense VM an IP from my LAN subnet. There is no LAN interface on the pfsense VM. The only port ive forwaded on my BT router is 1194 to the pfsense VM. The VPN is working perfectly fine. Infact i did the same openvpn setup using the openvpn script which i used on a ubuntu VM and i thought i could replicate the setup on pfsense

      Untitled Diagram.png

      The box i saw in pfsense is in the GEOIP settings. I only choose the UK country
      18e5edb0-0a36-430e-a4e4-cf8c9f3f3396-image.png

      1 Reply Last reply Reply Quote 0
      • B
        blackops786187
        last edited by blackops786187

        Like i said, my goal is simply to filter out the Bad IP's using the deny rules as i said and then only allow ones which are from the UK to reach the openvpn daemon.89241410-3552-4303-ad3d-061c03b4e1e1-image.png

        Would this work?. Ive made the europe GEOIP (UK Only) set as "Alias Native) and specified it as a source for the openvpn rule.

        Traffic will be forwarded from the bt router to the pfsense firewall where it will be filtered by the deny rules (PFB_PRIx), and then only the UK IP's (which werent filtered out) will be allowed to talk to the openvpn daemon. I may be incorrect as im not that well versed in how port forwading works but im hoping i make some sense

        1 Reply Last reply Reply Quote 0
        • NogBadTheBadN
          NogBadTheBad
          last edited by NogBadTheBad

          There is a double NAT 192.168.0.254/24 is an RFC 1918 address.

          Do yourself a big favour and try and get rid of it if you can.

          Do it like I suggested and create an IP alias.

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          1 Reply Last reply Reply Quote 0
          • B
            blackops786187
            last edited by blackops786187

            Hi, Can you explain how ive got a double NAT? I dont have a LAN interface on the VM. The pfsense VM is getting an IP from DHCP from my BT router putting it in the same network as the rest of my devices. Also i didnt set a LAN interface when i set it upf8f80e3e-ec83-4d7f-a26f-2d7df14cf9e2-image.png

            Like i said, im not the best with complex networking stuff so id appreciate any knowledge. Only way to learn :)

            1 Reply Last reply Reply Quote 0
            • NogBadTheBadN
              NogBadTheBad
              last edited by

              Sorry I missed the bit about no LAN interface.

              Screenshot 2020-10-12 at 19.12.41.png

              Create an alias in pfblocker like my earlier screenshot otherwise you tie up the whole Europe GeoIP alias.

              1 would be the alias you created.

              2 would be the WAN address.

              3 would be the port.

              Andy

              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

              1 Reply Last reply Reply Quote 0
              • B
                blackops786187
                last edited by blackops786187

                Not sure if ive done it correctly. This shoudl now filter all IP except for UK then apply the deny rules if they are bad IP's based on the feed?

                Created an alias permit with only the UK selected
                3d9dbb9d-661a-43e6-b93a-23dcc301ea5c-image.png
                ...................................................................................................
                Created the rule (UK_Pass_GEOIP)
                ed2e3abf-689d-412d-8478-e3e26614bdec-image.png

                1 Reply Last reply Reply Quote 0
                • B
                  blackops786187
                  last edited by

                  EDIT: Actually this may not work properly. Looking at the pfsense documentation, firewall rules are applied on a first match basis so in this case, if the IP is from the UK, the traffic will pass and the deny rules will be ignored as its based on a first match basis. Correct me if im wrong

                  Unless im missing something, why wouldn't this work. I mentioned this approach before.

                  b43342a7-d0eb-4577-99b8-7946ca54bf0a-image.png

                  If any IP matches the feeds in the deny rule, it will get blocked, then only the UK ip's (which werent on the bad feed list) will pass

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    SteveITS Galactic Empire @blackops786187
                    last edited by

                    @blackops786187 said in Pfblocker Permit Inbound Confusion:

                    If any IP matches the feeds in the deny rule, it will get blocked, then only the UK ip's (which werent on the bad feed list) will pass

                    That's correct as for the order. And then because of the default block rule, any other IP connecting to you will be dropped.

                    So in essence if you only cared about controlling inbound to the VPN port, you could skip the four inbound deny rules. Only UK is allowed in anyway by your bottom rule, and the rest is blocked by the default block rule "below that."

                    The outbound block rules would still affect/block outbound traffic (otherwise the connection could go out and the tracked state would allow the response).

                    Side note: you can also use Alias Native or other aliases as a NAT port redirection Source.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    B 1 Reply Last reply Reply Quote 0
                    • B
                      blackops786187 @SteveITS
                      last edited by

                      @teamits

                      Yes. My concern is limiting what reaches the openvpn daemon inbound.

                      In regards to your comment regarding removing the 4 deny rules, these rules are for Bad IP's. These feeds also have UK IP's in them so dont see how they are not needed as the UK geoip ruleset will allow all of the UK ip's and not filter out the bad ones

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        SteveITS Galactic Empire @blackops786187
                        last edited by

                        @blackops786187 said in Pfblocker Permit Inbound Confusion:

                        These feeds also have UK IP's in them

                        ah, if there is overlap then yes the block needs to be above the allow, sorry.

                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                        Upvote 👍 helpful posts!

                        T 1 Reply Last reply Reply Quote 0
                        • T
                          Tzvia @SteveITS
                          last edited by

                          Maybe I am missing something, but once I read, quite a few posts up, that the OP didn't have a 'lan' on his PFSense VM, and that his internal network was in what the PFSense sees as WAN. So you setup the filtering of that port, allowing some regions and blocking other regions from that open port. But once someone outside authenticates, what do they see? Nothing. What is the point of the VPN? Is it to connect to it from the coffee shop down the street, encrypted, and back out through your internet? If the whole point was mentioned, I missed it...

                          I still think the PFSense needs to be where the home router is and not internal with no LAN. I mean, if the extra 'security' was really needed, why leave out all the devices at that location...

                          Tzvia

                          Current build:
                          Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
                          16 gigs ram
                          500gig WD Blue nvme
                          Using modded BIOS (enabled CSTATES)
                          PFSense 2.72-RELEASE
                          Enabled Intel SpeedShift
                          Snort
                          PFBlockerNG
                          LAN and 5 VLANS

                          B 1 Reply Last reply Reply Quote 0
                          • B
                            blackops786187 @Tzvia
                            last edited by blackops786187

                            @Tzvia Its just used as a vpn endpoint to allow access to my LAN devices e.g my NAS drive securely and also , like you said, use public wifi securely without worrying about people snooping. Im not doing any firewalling my LAN devices with it. I could have easily used a ubuntu VM for setting this vpn up but wanted pfsense as i could configure firewall rules for VPN and using pfblocker for geoip whitlisting.

                            i wanted simply to lock down the open port i created on my bt router which is on the edge of my network and tighten my endpoint as much as possible

                            T 1 Reply Last reply Reply Quote 0
                            • T
                              Tzvia @blackops786187
                              last edited by

                              @blackops786187
                              But if I am reading it correctly, your LAN devices are, as far as PFSense is concerned, in the WAN. The VPN is not going to provide access to things in the WAN, from PFSense's perspective. It's for giving access to PFSense's LAN from the WAN. And you have nothing in the LAN, not even a ethernet port. No this is the wrong way to do things IMO. PFSense needs to be where your router is now. Your internal network needs to be on the LAN side. Router in bridge mode if the service permits it, OR worst case, PFSENSE in the router's DMZ with an internet IP on the WAN side, and all your internal items on the LAN side of PFSense.

                              I have both OpenVPN and IPSEC setup and yes I use them while on public wireless, even my phone using OpenVPN. No split tunnel, everything through my VPN encrypted and going OUT to the internet via my network/PFSense. I feel a little safer in public and can get to my NAS and servers if I need to. I used to run PFSense in a ESXI VM using two standard virtual 'switches' and two nics, one in the lan and the other in wan but now I am back to using a physical box.

                              Have you done any tests? Can you see anything?

                              Tzvia

                              Current build:
                              Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
                              16 gigs ram
                              500gig WD Blue nvme
                              Using modded BIOS (enabled CSTATES)
                              PFSense 2.72-RELEASE
                              Enabled Intel SpeedShift
                              Snort
                              PFBlockerNG
                              LAN and 5 VLANS

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                So your wanting to just have pfsense wan in your routers lan - and use that for vpn access to stuff in your lan?

                                Hmmm - you would for sure have to source nat vpn traffic so it looks like its coming from pfsense wan IP for that to have any chance to work.

                                What are you outbound nat settings, what are you using for the tunnel network?

                                Lets forget any blocking for a second - does the vpn work? And your just wanting to limit who can talk to the vpn port? Ie you want only UK IPs to talk to it?

                                I would validate the vpn actually is working how you have it setup before you go to lock it down.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                B 1 Reply Last reply Reply Quote 0
                                • B
                                  blackops786187 @johnpoz
                                  last edited by

                                  @johnpoz lol. Of course i made sure the vpn is functional before i considered locking it down. I can access the devices on my LAN without issue. Cant remember the exact tunnel network but its in the 10.x.x.x range. I've got the UK geoip whitelist working by using the alias native settings and choosing only the UK countries. I added that alias to the source of the OpenVPN rule and ive confirmed its working as intended

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    @blackops786187 said in Pfblocker Permit Inbound Confusion:

                                    've got the UK geoip whitelist working by using the alias native settings and choosing only the UK countries. I added that alias to the source of the OpenVPN rule and ive confirmed its working as intended

                                    That is how I would do it.. I use geoIP lists in pfblocker to limit could can talk my plex server for example.. And have the port different as well. To cut down on noise..

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.