Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Needing help from the jungles of Papua New Guinea

    Scheduled Pinned Locked Moved pfBlockerNG
    11 Posts 4 Posters 747 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @Cobra_Phil
      last edited by

      @cobra_phil said in Needing help from the jungles of Papua New Guinea:

      I created a bridge between VLAN20 and the WAN port.

      You basically turned pfSense into a switch ?.?

      Papua forest or not : a design would be nice.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      1 Reply Last reply Reply Quote 0
      • C
        Cobra_Phil
        last edited by

        I've greatly simplified my testing setup. I've removed the campus DHCP server, the Ubiquiti AP's, and the Vlan. All I have connected to the pfsense box is the ISP provided Ethernet cable which, via their DHCP server, gives out the IP addresses, DNS server, Gateway, etc., a windows client on the LAN port, and my laptop on the OPT2 port.

        WAN is configured with IPv4 and IPv6 as none.
        LAN is configured with IPv4 and IPv6 as none.
        OPT2(Admin) is configured with Static IP 192.168.0.99

        All DHCP services disabled.
        There is a bridge between WAN and LAN.
        pfsense running version 2.5.0-release
        pfblocker running version 3.0.0_15
        pfblocker is setup with default settings. No additional filtering enabled.

        Internet on the client works fine until I block DNS on the WAN.
        Nslookup times out after 2 seconds. Can not ping 10.10.10.1.
        If I disable the block on WAN DNS, internet works.
        If I enable the block on WAN DNS, internet does not work.

        The only difference I see between this setup and other videos I have seen is the bridge between WAN and LAN. I am at my wits end. Thanks for any help.

        alt text
        alt text
        alt text
        alt text
        alt text
        alt text
        alt text
        alt text

        alt text

        V M 2 Replies Last reply Reply Quote 0
        • V
          viragomann @Cobra_Phil
          last edited by

          @cobra_phil
          When you block outgoing DNS on the WAN, pfSense itself cannot access DNS servers anymore as well. There are much better ways to ensure that the internal clients use the local DNS: https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html.

          C 1 Reply Last reply Reply Quote 0
          • C
            Cobra_Phil @viragomann
            last edited by

            @viragomann
            Thanks for the suggestion. I tried that setting and the DNS query still went to the ISP assigned DNS server. It seem like no matter what I try, the query either gets blocked or it goes back to the ISP assign DNS server. It seems that since I have a bridge between the LAN and WAN ports, and the clients are assigned IP, Gateway, and DNS from the ISP's DHCP server, I am not able to intercept and redirect the DNS queries. I've watched dozens of YouTube videos and for most people, pfblockerng seems to just work. I've reloaded and started pfsense/pfblockerng from scratch at least 2 dozen times now over the last 4 days without making any progress. Any other suggestions?

            GertjanG V 2 Replies Last reply Reply Quote 0
            • GertjanG
              Gertjan @Cobra_Phil
              last edited by

              @cobra_phil said in Needing help from the jungles of Papua New Guinea:

              Any other suggestions?

              Don't do this :

              @cobra_phil said in Needing help from the jungles of Papua New Guinea:

              I have a bridge between the LAN and WAN ports

              as clients gets DHCP info from the ISP, because its bypassed pfSense.
              Bypassed for everything.
              Also for DNS.
              I wonder what your pfSens is actually doing / used for.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • V
                viragomann @Cobra_Phil
                last edited by

                @cobra_phil
                Redirecting the DNS traffic should work anyway.
                Possibly unbound sends it's traffic to the ISPs DNS. Or you did something wrong. Since you don't provide your settings, it's hard to say.
                You can sniff the packets to see, what's going on.

                However, also not clear what the goal of the WAN-LAN bridge is indeed. If you only want your clients to pull network settings from the ISP you can enable the DHCP relay and configure the clients network accordingly.

                1 Reply Last reply Reply Quote 0
                • M
                  mdouglass108 @Cobra_Phil
                  last edited by

                  @cobra_phil

                  I'm not entirely sure what your goals are and this setup seems highly unusual. What is the purpose of the bridge between wan and lan? Why would you not have pfSense act as the gateway to your private network and use NAT to translate the individual clients on your network to the ISP? That would be a more plain vanilla setup.

                  ISP -----> Public IP address (via DHCP) ------> pfSense WAN interface ------> NAT ------->
                  Private LAN addresses -----> windows client / WirelessAP / laptop(s) / other clients and services.

                  Can you start at the beginning and state your big picture goal(s)?

                  C 1 Reply Last reply Reply Quote 0
                  • C
                    Cobra_Phil @mdouglass108
                    last edited by

                    @mdouglass108
                    The ISP uses access cards (login and password) for clients to get access to internet. So, the clients have to get their IP address from the ISP DHCP server. They cannot get it from our router's DHCP server. Each client gets their own ISP assigned IP address and when their allotted data is used up, they are disconnected. I can get the clients internet access, but I can not figure out how to intercept the ISP assigned DNS server to assign our own DNS server for filtering.

                    M 2 Replies Last reply Reply Quote 0
                    • M
                      mdouglass108 @Cobra_Phil
                      last edited by

                      @cobra_phil

                      So your goal is to give each client internet access but be able to control DNS and filter content? Are there any other goals?

                      The way you have it now with the bridge between WAN and LAN is effectively the same as if you plugged a cable from WAN directly into LAN and completely bypassed your pfsense box. It would also be similar if you plugged all your clients into the same switch and just relied on the ISP to sort out DHCP, DNS, etc.

                      If I am reading between the lines correctly, the ISP has assigned your organization a group of IP addresses via a DHCP pool of their choosing. When your client "plugs in" either physically or over wifi, they are assigned an IP address and then have to enter some credentials to get internet access. This allows the ISP to verify clients and log usage to enforce data caps.

                      Are addresses assigned by the ISP to each client IPv4 or IPv6? Publicly route-able addresses (each client visible to the internet at large) or private addresses (behind an ISP gateway that controls access to the internet at large)?

                      Address ranges reserved for private use are:
                      10.0.0.0/8 = 10.0.0.0 through 10.255.255.255
                      172.16.0.0/12 = 172.16.0.0 through 172.31.255.255
                      192.168.0.0/16 = 192.168.0.0 through 192.168.255.255

                      How many physical Ethernet ports on the box you're using to run pfSense?

                      1 Reply Last reply Reply Quote 0
                      • M
                        mdouglass108 @Cobra_Phil
                        last edited by

                        @cobra_phil

                        I just realized that some of the answers to my questions were available in some of the screenshots your posted a month ago in your original post. Here is my thinking from the 35,000 foot view........

                        1. Configure pfSense to receive an address from ISP on WAN via their DHCP server
                        2. Create a "management" interface on LAN with a private address range and its own DHCP server. This allows you to plug in a laptop or other host and talk to pfSense, manage firewall rules, DNS, pfBlocker etc. as well as any switches or wireless access points you might have
                        3. Create a bridge interface with WAN & OPT1 where all your clients will connect. This will be a DMZ of sorts where your clients get addresses directly from ISP and can pass credentials, etc. See Internal / External Bridges on this page:

                        https://docs.netgate.com/pfsense/en/latest/bridges/index.html

                        1. Create a series of firewall rules to intercept and redirect DNS traffic to pfSense.
                        2. Configure Unbound to listen for DNS requests on OPT1. Unbound can then either act as a resolver and serve up the appropriate web addresses or forward those requests to your DNS provider of choice.
                        3. pfBlocker can also be used on pfSense defined interfaces (WAN, LAN, OPT1....) to filter content, IP ranges, etc.

                        Hope this helps. I'm far (far, far) from an expert but let me know how you want to proceed.

                        Cheers.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.