Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Need help with my VLAN firewall rules to make sure they do what I think they do

    Scheduled Pinned Locked Moved Firewalling
    69 Posts 5 Posters 4.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      imthenachoman @johnpoz
      last edited by

      @johnpoz said in Need help with my VLAN firewall rules to make sure they do what I think they do:

      ...

      The 127.0.0.1 is a typo. It should be 127.0.0.1.

      You're right on the reject rules. This is my first time playing around with FW rules and I wasn't sure at first. I've cleaned my rules up.

      when does ssh use UDP

      My mistake. Will fix.

      But then you also have a rule allowing 22 to the dmz address? What is the point of that

      I want all devices in VL20_trust to be able to SSH to devices in VL10_dmz. But ignore that rule for now. I haven't actually added it cause I'm trying to get the other rules to work first.

      Right now I am trying to make it so client DNS queries all go through pfSense. And they sorta are, but not how I expect.

      Looking at just my current LAN rule I created a redirect as mentioned here: https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html. My understanding of the rule is:

      1. traffic on LAN
      2. going to anywhere not LAN address on port 53
      3. redirect to 127.0.0.1:53 (pfSense)

      But the client is getting LAN address (192.168.1.1) as the DNS server so it is sending its DNS queries to interface address (192.168.1.1). Ergo, the port forward rules don't get triggered.

      Below is picture of my port forward rule and LAN FW rules. No traffic is going to the LAN DNS rule.

      1c3a018b-e9cd-40db-a09a-b5bb118f7790-image.png

      1ee632d2-ee5a-4d3c-ba98-a05670564e5c-image.png

      I followed the instructions in the recipe so I am not sure what is wrong. Is there something else I need to be doing? I feel like I am missing a step that is supposed to make it so DNS queries on LAN/VLAN address (like 192.168.1.1) also go to 127.0.0.1:53?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @imthenachoman
        last edited by johnpoz

        If your lan address is 192.168.1.1 on pfsense, that redirect would not come into play... Your port forward says if NOT lan address (192.168.1.1)

        But your sending dns queries to 192.168.1.1..

        If you want to test that rule, send directed dns query to say 8.8.8.8 or something..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        I 1 Reply Last reply Reply Quote 0
        • I
          imthenachoman @johnpoz
          last edited by

          @johnpoz

          I see. So the clients use the LAN/VLAN address as the DNS server. What do I need to do to make sure the DNS queries clients send, to the LAN/VLAN address, also get routed to 127.0.0.1? Another port forward rule?

          bingo600B johnpozJ 2 Replies Last reply Reply Quote 0
          • bingo600B
            bingo600 @imthenachoman
            last edited by bingo600

            @imthenachoman said in Need help with my VLAN firewall rules to make sure they do what I think they do:

            @johnpoz

            I see. So the clients use the LAN/VLAN address as the DNS server. What do I need to do to make sure the DNS queries clients send, to the LAN/VLAN address, also get routed to 127.0.0.1? Another port forward rule?

            How about changing from !LAN to "Any"

            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

            pfSense+ 23.05.1 (ZFS)

            QOTOM-Q355G4 Quad Lan.
            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

            I 1 Reply Last reply Reply Quote 1
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @imthenachoman
              last edited by johnpoz

              @imthenachoman said in Need help with my VLAN firewall rules to make sure they do what I think they do:

              o the LAN/VLAN address, also get routed to 127.0.0.1? Another port forward rule?

              what would it matter? They are going to the same place to be honest. They are still going to unbound be it loopback or 192.168.1.1 - still going to unbound.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              I 1 Reply Last reply Reply Quote 1
              • I
                imthenachoman @bingo600
                last edited by

                @bingo600

                Thanks. I was thinking that but then unsure since the pfsense recipe didn’t say that. I kinda assumed the recipe instructions would do what I need/expect — assuming it was written with the understanding that clients would get LAN IP as DNS server.

                1 Reply Last reply Reply Quote 0
                • I
                  imthenachoman @johnpoz
                  last edited by

                  @johnpoz

                  But the port forward rule says to forward anything NOT to the LAN IP. Since the clients are using the LAN IP as DNS server, the port forward rule never triggers. Or am I misunderstanding?

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @imthenachoman
                    last edited by bingo600

                    @imthenachoman

                    The forward rule is a "Catch any" and redirect to 127.0.0.1 (that's the pfsense).

                    The only thing not "Caught" is the DNS going directly to the LAN interface ... Who/what do you think handles the requests on the incomming Lan interface ?? 😊

                    /Bingo

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    I 1 Reply Last reply Reply Quote 1
                    • I
                      imthenachoman @bingo600
                      last edited by

                      @bingo600

                      I see. So I guess I need a FW rule to allow clients to access LAN address. I don’t think I have that right now. :/

                      I johnpozJ 2 Replies Last reply Reply Quote 0
                      • I
                        imthenachoman @imthenachoman
                        last edited by

                        EUREKA!

                        So I had to add another FW rule that says allow IPv4 TCP/UDP from LAN net to LAN net on 53. I can see that rule working.

                        Thanks all!

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @imthenachoman
                          last edited by johnpoz

                          @imthenachoman said in Need help with my VLAN firewall rules to make sure they do what I think they do:

                          I don’t think I have that right now. :/

                          yeah you do
                          yeahyoudo.png

                          That rule allows anything - if there was not a specific deny above that - then it would be allowed.

                          Rules are evaluated top down. first rule to trigger wins, no other rules are evaluated. So if your trying to talk to 192.168.1.1 on 53 you have no rules above that any any rule that would block that or force it elsewhere - so its allowed. by your last rule.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          I 1 Reply Last reply Reply Quote 1
                          • I
                            imthenachoman @johnpoz
                            last edited by

                            @johnpoz

                            Yes but it wasn't doing what I was expecting.

                            I would have expected the FW rule I circled (the port forwarding of DNS from LAN to pfSense) to be triggered. But it wasn't and so the catch all rule was catching it.

                            But I figured out the issue and created a FW rule to allow traffic from LAN net to LAN net on 53. That rule is triggering for the client DNS queries -- so I don't need the catch all.

                            Not that you asked, but if you're curious, I've been making notes for myself and decided to put it in a public gist to hopefully help others out. https://gist.github.com/imthenachoman/67ca5f0cb747b680ca4a44abdc564b20

                            johnpozJ 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @imthenachoman
                              last edited by

                              @imthenachoman said in Need help with my VLAN firewall rules to make sure they do what I think they do:

                              FW rule to allow traffic from LAN net to LAN net on 53.

                              Rule doesn't make a lot of sense.. If you want to allow access to lan address, then allow that.. lan net as destination on the lan interface makes no sense..

                              Lan can already talk to anything else on the lan, devices on lan don't talk to pfsense to talk to other stuff on lan. So lan net as destination makes no sense on the lan interface. Lan address is a destination that makes sense, stuff other than lan make sense..

                              We already went over why your circled rule wouldn't match..

                              Not sure where you got the idea that everything needs to be redirect to pfsense. Are you not handing them already.. If you don't want things talking to other than pfsense for dns or ntp. Block it I think is better.

                              Would you like it if your isp said, hey you know what we don't want clients using google - so lets redirect them so they think they are talking to google, but they will really be talking to us.

                              Redirection can be a solution to a problem - where client X doesn't listen to what you you hand him via dhcp, or set on him directly.. Personally I think its a bad idea to do as some sort of standard.. I would say a block rule is prob better than you log, so you can see hey this client I hand pfsense for dns, why does he continue to bang his head trying to query google for xyz.tld..

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              I 2 Replies Last reply Reply Quote 1
                              • I
                                imthenachoman @johnpoz
                                last edited by

                                @johnpoz

                                I want to have very tight control of what traffic is allowed where. I don't want any kind of "default allow all" rule or anything.

                                Lan can already talk to anything else on the lan, devices on lan don't talk to pfsense to talk to other stuff on lan. So lan net as destination makes no sense on the lan interface. Lan address is a destination that makes sense, stuff other than lan make sense..

                                So, my understanding is, LAN net is 192.168.1.1, right? That is also what clients on LAN get for the DNS server. So when said clients want to do a DNS query they send it to 192.168.1.1:53. Am I right so far?

                                So if I want traffic from the LAN clients coming through LAN net to be able to make DNS queries to 192.168.1.1:53, or LAN net:53, then I need a FW rule saying traffic from LAN net to LAN net:53 is allowed. Right?

                                Not sure where you got the idea that everything needs to be redirect to pfsense.

                                Why is it not better to have a central authority for all DNS queries on my network? That way those queries are cached. So if system1 looks up example.com, when system2 looks it up, pfSense can return a cached response. Isn't that good/desirable?

                                bingo600B 1 Reply Last reply Reply Quote 0
                                • I
                                  imthenachoman @johnpoz
                                  last edited by

                                  @johnpoz

                                  I wager most folks disagree with me for having excessively strict rules. I'd be willing to debate/discuss it with someone but I much prefer the policy of only allowing exactly what is needed, nothing more, nothing less.

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • N
                                    netblues
                                    last edited by

                                    LAN address is the address of the interface of the pfSense to the LAN. (ie. 192.168.1.1/32)
                                    LAN subnet is the subnet attached to this interface. (ie. 192.168.1.0/24)

                                    As for caching of dns, well, unbound is bound to all running interfaces, so this will happen by default, without any redirects.

                                    If you are using pfblockerng, then yes, you probably want some control over external dns access

                                    Having total control is nice, but it also means to be constantly adjusting things.
                                    Its nice as an exercise, but doing that in a home network with demanding users (aka kids) is kinda of a full time job.

                                    1 Reply Last reply Reply Quote 1
                                    • bingo600B
                                      bingo600 @imthenachoman
                                      last edited by bingo600

                                      @imthenachoman said in Need help with my VLAN firewall rules to make sure they do what I think they do:

                                      So, my understanding is, LAN net is 192.168.1.1, right? That is also what clients on LAN get for the DNS server. So when said clients want to do a DNS query they send it to 192.168.1.1:53. Am I right so far?

                                      So if I want traffic from the LAN clients coming through LAN net to be able to make DNS queries to 192.168.1.1:53, or LAN net:53, then I need a FW rule saying traffic from LAN net to LAN net:53 is allowed. Right?

                                      Re: Lan net vs Lan address (pulldown selections)
                                      Lan address is the specific interface adresss : ie. 192.168.1.1
                                      Lan net is the defined network : ie. 192.168.1.0/24

                                      For allowing any (on the Lan) to send DNS req. to the interface i would do.

                                      IF : LAN
                                      AF: IPv4
                                      Proto: TCP/UDP
                                      SRC: Lan net
                                      Dest: Lan address (Only matches The interface ip)
                                      Port: DNS

                                      Allow Lan Net to Lan Net , would only be effective if the dest-ip was the Lan interface, as all other packets sent between devices on the same "subnet" would be sent directly between the devices. And not pass the firewall. Hence the rule would be better indicating : LanNet to Lan address (interface ip)

                                      Btw: I totally agree with @netblues , that only allowing specific permits , on a "general use" subnet. Would be a steady job.

                                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                      pfSense+ 23.05.1 (ZFS)

                                      QOTOM-Q355G4 Quad Lan.
                                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                      I 2 Replies Last reply Reply Quote 1
                                      • bingo600B
                                        bingo600
                                        last edited by

                                        Btw:
                                        Only allow DNS requests to "Lan address" seems a bit contradictive , with the purpose of the "DNS forward rule".

                                        The forward rule (Catch all DNS) , is usually made in order to catch programs/apps that uses "hardcoded" or custom DNS servers. Ie. a Google app that tried to resolve DNS via 8.8.8.8.

                                        If DNS to "any" was allowed (while the DNS forward rule was in place) , the request to 8.8.8.8 would be rewritten to 127.0.0.1 once the package was entering the pfSense , and the APP would still get a DNS answer (from pfSense).

                                        If you only allow DNS to the LAN address (interface) the request to 8.8.8.8 would just be dropped.

                                        It depends on what you want .....

                                        I only allow DNS to my "interface" , and all(most) all apps that tries a "foreign" DNS , will fall back to the DNS given by DHCP.

                                        But it will break Ie. PI-Hole updates , as they now relies on SRV records from a specific DNS server , to inform about supported OS'es. And the forward "trick" would also break it.

                                        I think i have 2..3 apps that are misbehaving if not allowed to their native DNS. I can live with those limitations.

                                        /Bingo

                                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                        pfSense+ 23.05.1 (ZFS)

                                        QOTOM-Q355G4 Quad Lan.
                                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                        johnpozJ 1 Reply Last reply Reply Quote 1
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @bingo600
                                          last edited by johnpoz

                                          @bingo600 said in Need help with my VLAN firewall rules to make sure they do what I think they do:

                                          as they now relies on SRV records from a specific DNS server

                                          huh/what?? That is not how it works..

                                          Your saying pihole has to talk to a specific NS or it can't update??

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          bingo600B 1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @imthenachoman
                                            last edited by johnpoz

                                            @imthenachoman

                                            Not saying you can not stop something from talking to DNS you don't want it to - my point is redirection of traffic hiding from the client that it not talking to who it thinks it is talking to is not good practice.

                                            You sure and the F would not like it if your isp did it to you.. While its your network and you can do what you want. It amounts to the pot calling the kettle.

                                            If you don't want something talking to outside dns, then block it sure.. But redirection is not good idea if you ask me..

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.