Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Preventing to access pfSense login page on IoT VLAN

    Scheduled Pinned Locked Moved Firewalling
    44 Posts 6 Posters 6.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM @keesdek
      last edited by

      @keesdek Post a screen of your rules for that interface.

      K 1 Reply Last reply Reply Quote 0
      • K
        keesdek @KOM
        last edited by

        @kom 202105 Screenshot pfSense Test-VLAN Rules.png

        KOMK 1 Reply Last reply Reply Quote 0
        • KOMK
          KOM @keesdek
          last edited by KOM

          @keesdek Rules are processed top-down first match (except floating rules which are last-match unless you have the Quick option selected.) All your rules are out of order since the top rule allows everything. That rule should be last, not first. Your problem isn't your rules.

          K 1 Reply Last reply Reply Quote 0
          • K
            keesdek @KOM
            last edited by

            @kom Thanks again for your help!
            I tried 'johnpoz' (above) order first, but since it didn't work then, I started changing the order...

            KOMK 1 Reply Last reply Reply Quote 0
            • KOMK
              KOM @keesdek
              last edited by

              @keesdek Can you confirm that your test client is on test_vlan30?

              K 1 Reply Last reply Reply Quote 0
              • K
                keesdek @KOM
                last edited by

                @kom Yes, the test client is on test_vlan30. And in the mean time my computer has acquired an IP address. But still no internet

                KOMK 1 Reply Last reply Reply Quote 0
                • KOMK
                  KOM @keesdek
                  last edited by

                  @keesdek In the meantime? Getting an address via DHCP should be almost instantaneous. What is this client? PC, phone? Physical, virtual? Windows, Mac, Linux? Any hardware like a switch between client and pfSense? What do your outbound NAT rules look like?

                  K 1 Reply Last reply Reply Quote 0
                  • K
                    keesdek @KOM
                    last edited by

                    @kom Well... initially I configured the test_vlan30 interface incorrectly. But that is fixed. Attached a screenshot of the outbound NAT rules202105 pfSense NAT Outbound Rules.jpg

                    KOMK 1 Reply Last reply Reply Quote 0
                    • KOMK
                      KOM @keesdek
                      last edited by

                      @keesdek What is this client? PC, phone? Physical, virtual? Windows, Mac, Linux? Any hardware like a switch between client and pfSense?

                      K 1 Reply Last reply Reply Quote 0
                      • K
                        keesdek @KOM
                        last edited by

                        @kom Client is a Mac, connected via UniFy switch and wireless access point

                        KOMK 1 Reply Last reply Reply Quote 0
                        • KOMK
                          KOM @keesdek
                          last edited by KOM

                          @keesdek So lots in between to cause problems. I'm not a Mac guy. Can you confirm that it gets an IP address in the correct range, has the correct mask, gateway and DNS?

                          Troubleshooting Network Connectivity

                          K 1 Reply Last reply Reply Quote 0
                          • K
                            keesdek @KOM
                            last edited by

                            @kom I can confirm all

                            KOMK 1 Reply Last reply Reply Quote 0
                            • KOMK
                              KOM @keesdek
                              last edited by

                              @keesdek Delete all your rules on that interface except an allow all rule. Get basic connectivity working before you start to restrict things. Once that is done, can you ping the interface from the Mac?

                              K 1 Reply Last reply Reply Quote 0
                              • K
                                keesdek @KOM
                                last edited by

                                @kom Did that and am able to ping the interface. In the webbrowser the pfSense web gui opens as well. And I have internet connection as well

                                K 1 Reply Last reply Reply Quote 0
                                • K
                                  keesdek @keesdek
                                  last edited by

                                  @keesdek Well, looks like it works now. Here is what I did. After deleting all the rules except the allow rule, I started turning the rules on again from the bottom up. When I leave the top rule turned off, it works! On the test network I can connect to the internet, but am not able to open the pfSense web gui
                                  Thank you very much for your help KOM and others!!
                                  Still a lot to learn on my side😊

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @keesdek
                                    last edited by johnpoz

                                    @keesdek said in Preventing to access pfSense login page on IoT VLAN:

                                    eave the top rule turned off,

                                    Then there is no way you would have internet.. Again rules are evaluated top down.. If you have not any rule - how would you have internet? You wouldn't not through this interface you wouldn't..

                                    Also whatever you dhcp issue - has nothing to do with rules.. You could have zero rules, you could have explicit rules blocking dhcp and it would still work.. once you enable dhcp on interface - hidden rules are created that allow dhcp to work..

                                    So you saying dhcp wasn't working had nothing to do with any rules you created that is for sure.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    K 1 Reply Last reply Reply Quote 0
                                    • K
                                      keesdek @johnpoz
                                      last edited by

                                      @johnpoz The dhcp issue was due to the fact that I misconfigured the test_vlan interface...

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        AWilson60 @johnpoz
                                        last edited by

                                        @johnpoz Brilliantly useful. This is EXACTLY what I wasted time trying to blindly do on my own via google and youtube. THANK YOU

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          aclouden
                                          last edited by aclouden

                                          Hey all... I was just reading through firewalling posts and wanted an opinion on this topic where rules I have setup are concerned. In my case, I needed other trusted networks to be able to initiate traffic to IOT devices but not the other way round. Further, I do not use pfsense as a dhcp server because it acts as a dhcp relay. My setup is a bit different where I am using a L3 switch for trusted networks where the routing between them is done on the switch. Untrusted vlans such as GUEST and IOT are sent up to pfsense via a separate trunked interface where I have the firewall governing where the traffic on those vlans can and cannot go. I wanted to know if what I am doing on IOT from a rule perspective is the best method. You will notice some of the original rules I have disabled in favor of the newer rules. What you see below functions as I described for the IOT network. Thoughts?

                                          iot-rules.PNG

                                          johnpozJ 1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @aclouden
                                            last edited by johnpoz

                                            @aclouden If you have dhcp enabled on this interface "iot" then that rule for dhcp is pointless.. And it wouldn't even work anyway because discover wouldn't be to an IP (its a broadcast), etc. not sure what you have in that alias, but once you enable dhcp on an interface, hidden rules are created to allow for dhcp clients to talk to the dhcp server.

                                            What is your IOT network using for dhcp? You don't have anything allowed that would let it talk to pfsense for dns.

                                            Not sure what "to iot but not from iot" is suppose to mean.

                                            Rules on the iot interface have zero to do with other networks creating traffic to the iot network.

                                            If you want other networks to talk to IOT, then those rules would go on those interfaces. If you don't want iot to talk to other networks, then your rfc1918 rule would do that.. Here is a sample listing of locked down network.. My other networks can talk to it all day, but this network can not talk to any other of my networks that rfc191.

                                            block.jpg

                                            the rfc1918 alias contains the rfc networks

                                            alias.jpg

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            A 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.