Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN SSL and IP on WAN interface

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 3 Posters 990 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @reynold
      last edited by

      Nat is not really a security aspect.. While if port X is only forwarded to pfsense rfc1918 wan ip it would keep pfsense logs free of noise.

      While nat can be seen as preventing traffic to any port on your device, and could be beneficial if your device doesn't have a firewall and ports you don't want exposed could be exposed if not behind a nat.

      Out of the box all unsolicited traffic to pfsense wan is dropped out of the box anyway.

      If your exposing service xyz to the public internet - doesn't really matter if natted or not from a security point of view.

      I wouldn't expose the pfsense gui to the public internet be it natted or not, unless you could lock down the source IP to your known IP your coming from.

      Its best for remote admin to vpn in..

      Nat or Napt in general should not be seen as a security feature..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      DaddyGoD 1 Reply Last reply Reply Quote 1
      • DaddyGoD
        DaddyGo @reynold
        last edited by DaddyGo

        @reynold said in VPN SSL and IP on WAN interface:

        I need to manage the firewall remotely and my worry is that the firewall is accessible from internet with public IP so I was thinking to use natted IP on wan interface.

        The firewall (NGFW) by default, all traffic is rejected DROPPED on the WAN interface.

        so don't worry until you start opening unnecessary ports to the world

        Instead of HTTPS, I would still recommend a VPN solution for remote management, something like this:

        6a354c1d-64aa-4b0c-bc7b-ea997e38fdf0-image.png

        15377421-975d-41c2-a813-bce2d489365e-image.png

        Cats bury it so they can't see it!
        (You know what I mean if you have a cat)

        1 Reply Last reply Reply Quote 1
        • DaddyGoD
          DaddyGo @johnpoz
          last edited by

          @johnpoz

          Oops cross-posted, almost the same ๐Ÿ˜‰

          Cats bury it so they can't see it!
          (You know what I mean if you have a cat)

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @DaddyGo
            last edited by

            @daddygo hehe - yeah pretty close.

            Small edit I would suggest for you

            by default, all traffic is rejected on the WAN interface.

            Not technically correct - the traffic is not "rejected" its dropped.. Reject on wan is almost always a bad idea.. Why would you send back a RST, you would want to just drop/ignore the traffic.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            DaddyGoD 1 Reply Last reply Reply Quote 0
            • DaddyGoD
              DaddyGo @johnpoz
              last edited by DaddyGo

              @johnpoz said in VPN SSL and IP on WAN interface:

              the traffic is not "rejected" its dropped.

              True :)

              ++edit:
              The DeepL spellchecker has replaced the words

              Cats bury it so they can't see it!
              (You know what I mean if you have a cat)

              R 1 Reply Last reply Reply Quote 1
              • R
                reynold @DaddyGo
                last edited by

                @daddygo @johnpoz
                Thank you guysโœŠ

                So, just for recap:

                1. public IP on WAN interface
                2. VPN solution for remote management as @DaddyGo explained

                I abolutely agree with you when you says to not expose pfsense gui on internet. That is exactly what I want to obtain.

                Now i know how i can do that! I will use VPN solution instead using HTTPS on a specific port.

                That's absolutely the best way, instead HTTPS or NAT.

                Thanks again,

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @reynold
                  last edited by

                  You can run your vpn over 443 if you want.. I do - since 443 is almost always open no matter where your coming from, and you can even bounce it off a proxy (say at your work location)..

                  I even share this port with other services available to the public, via haproxy.. So my users can request movies for my plex ;) via that service. Haproxy does the ssl offload for that even. And using sni restrictions - if they don't send the correct fqdn, say some bot just hitting my ip on 443.. haproxy would not send the traffic through to my request service.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  DaddyGoD R 2 Replies Last reply Reply Quote 1
                  • DaddyGoD
                    DaddyGo @johnpoz
                    last edited by

                    @johnpoz said in VPN SSL and IP on WAN interface:

                    443.. haproxy

                    We use exactly this solution for our IceCast2 servers running behind pfSense, -cool stuff ๐Ÿคš

                    Cats bury it so they can't see it!
                    (You know what I mean if you have a cat)

                    1 Reply Last reply Reply Quote 0
                    • R
                      reynold @johnpoz
                      last edited by

                      @johnpoz said in VPN SSL and IP on WAN interface:

                      You can run your vpn over 443 if you want.. I do - since 443 is almost always open no matter where your coming from, and you can even bounce it off a proxy (say at your work location)..

                      OpenVPN use 1194 port by default isn't it?
                      Can i run VPN also on 443?

                      DaddyGoD 1 Reply Last reply Reply Quote 0
                      • DaddyGoD
                        DaddyGo @reynold
                        last edited by DaddyGo

                        @reynold said in VPN SSL and IP on WAN interface:

                        OpenVPN use 1194 port by default isn't it?

                        Yes and no, you can put it anywhere you like either to 50-60K too

                        550fc607-b5d7-464e-aeca-aa45ab0748a5-image.png

                        Yes 443 also works :-)

                        ++++edit:

                        John @johnpoz suggested 443 because it is the HTTPS port.
                        Therefore it is always open and this is not restricted by the ISPs, because it would be pointless

                        Cats bury it so they can't see it!
                        (You know what I mean if you have a cat)

                        johnpozJ 1 Reply Last reply Reply Quote 1
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @DaddyGo
                          last edited by johnpoz

                          yeah the default udp port is 1194, this could quite often be blocked from where your at... 443 never going to be blocked if internet is open. even they are forcing traffic through a proxy you can still get your vpn connection over the proxy on 443.

                          udp is normally a best choice for the vpn - but hey if it doesn't work tcp over 443 is pretty much guaranteed to work - even if not optimal connection, etc.

                          You can run both, I run a tcp 443 instance along with a 1194 udp instance.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.