Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Disable https on public IP

    Scheduled Pinned Locked Moved General pfSense Questions
    5 Posts 2 Posters 634 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      droidus
      last edited by

      How do I disable the web server from listening on my public IP?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ Offline
        johnpoz LAYER 8 Global Moderator @droidus
        last edited by johnpoz

        You don't the firewall rules do not allow access out of the box from the wan side. The web gui listens on all interfaces.

        If you do not want access to the web gui from the wan, do not put in rules that allow it. If you do not want to allow access from your lan side networks to access web gui via the wan IP or any other lan side IP, then put in rules to block it, etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        D 1 Reply Last reply Reply Quote 1
        • D Offline
          droidus @johnpoz
          last edited by

          @johnpoz I have these rules on my WAN, and I am still able to connect to the public IP. Capture.PNG

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator @droidus
            last edited by johnpoz

            By default the wan blocks all unsolicited inbound traffic, all interfaces do.. Default Deny is pfsense default.. The wan out of the box has no rules on it - all access from outside would be blocked. If you are accessing your gui from the wan side, then you must of put in a rule to allow it either on the wan or floating.

            You would be able to access the public IP from any lan side device yes - since default is any any, and your public IP falls under any ;)

            What other rules on the wan do you have? Or floating tab? Are you actually testing from external - go to can you see me . org for example.

            Or go to the grc port scanner.. Testing access to your public IP from the local side is not valid test for what can be accessed from outside pfsense. If you don't want local devices hitting your wan IP, then you need to put block rules on your lan side interfaces. The "this firewall" is a good alias to use. Since it would include all your pfsense IPs wan, lan, vlan, optX, etc. This can keep client on lan from accessing optX IP as well as wan IP.

            edit: Here maybe this example will help.

            Here from my lan - my gui listens on 8443.. I can access my pfsense wan IP from lan, because there is any any rule that allows my lan to go anywhere, any IP any port.

            lan.png

            But from the WAN side.. I have no rules that allow that access.. So its blocked.

            outside.png

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 2
            • D Offline
              droidus
              last edited by

              I think that's what my issue was - hitting the public-facing ip from my LAN.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.