Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    My Rules to block certain IPs from the internet is not working

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 3 Posters 947 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM @derekmarch
      last edited by KOM

      @derekmarch Ah I didn't notice with that big wall of white.

      Get rid of that rule on WAN. It's not needed. One thing with firewall rules that trips up new people is that a new rule or modified rule will not affect established traffic. For the rule to take effect, you must clear the states of the clients that the rule will apply to.

      For your LAN rules, you have told it to block access from LAN to destination Block_from_Internet. That isn't valid. You want to block from SOURCE, not destination. The source is your LAN clients, destination would be where they're trying to go. Change your rule so that the Source is Block_from_Internet and Destination is Any. Then go to Diagnostics - States and clear the states of those two LAN client.

      D 1 Reply Last reply Reply Quote 0
      • D
        derekmarch @KOM
        last edited by

        @kom I have tried clearing the states a number of times during my hours of troubleshooting. But I will keep that in mind. After my current meeting I'll give this rule change a try. Thanks for the suggestion

        KOMK 1 Reply Last reply Reply Quote 0
        • KOMK
          KOM @derekmarch
          last edited by

          @derekmarch Take the time to quickly read up on the two links I gave you. It's hard to play the game when you don't know the rules.

          johnpozJ D 2 Replies Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @KOM
            last edited by

            Also what else did you do to that rule, you have the advanced gear showing.. But your not showing your advanced settings...

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            D 1 Reply Last reply Reply Quote 0
            • D
              derekmarch @johnpoz
              last edited by

              @johnpoz 106c420b-98f0-49f1-82f4-ab26fc63cb1a-image.png

              The only thing I did in advanced as part of my troubleshooting was set state from Keep to None.

              Should i revert that back to Keep?

              1 Reply Last reply Reply Quote 0
              • D
                derekmarch @KOM
                last edited by

                @kom Thank you for those links, I will give them a read.

                johnpozJ KOMK 2 Replies Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @derekmarch
                  last edited by johnpoz

                  yeah your going to want to keep states ;)

                  The way your rule was written it would never triggered as you can see by the 0/0 - your destination was what you want your source to be if you want to block those 2 IPs from going to the internet.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM @derekmarch
                    last edited by

                    @derekmarch Also:

                    Firewall and NAT Fundamentals on pfSense

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @KOM
                      last edited by

                      BTW something is missing from this puzzle - because with the way those rules are. Nothing would be able to go to the internet.. Since you have no allow other than going to the gui of pfsense.

                      Do you have rules in floating or something?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      D 1 Reply Last reply Reply Quote 0
                      • D
                        derekmarch @johnpoz
                        last edited by

                        @johnpoz Sorry for the confusion with my screen shots, there are plenty more rules below my screen shot, i just cut it off at the relevant line I had added for this purpose.

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • D
                          derekmarch
                          last edited by

                          OK,

                          I disabled the WAN rule and flipped the LAN rule I had. and it now appears my laptop has no access to the internet.

                          It appears my laptop can still access other items on the LAN.

                          How do I set this up so that the IPs in this alias can't access the WAN or the LAN?

                          Thanks for all the help so far

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @derekmarch
                            last edited by johnpoz

                            @derekmarch ah - if you look close you can see the difference in color that would be the next row.. But yeah its always best to show all rules on an interface when troubleshooting..

                            It appears my laptop can still access other items on the LAN.

                            Well yeah.. pfsense has nothing to do with devices on the same network talking to each other.

                            If you don't want them accessing other stuff - move them to their own vlan would be the easy simple best solution.. Filtering devices on the same network from talking to each other would have to be done via your switch infrastructure, ie like a private vlan setup. Or via host firewalls. Pfsense has nothing to do with devices talking amongst themselves on a network - only to get off said network is where pfsense comes into play routing and firewalling.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            D 1 Reply Last reply Reply Quote 0
                            • D
                              derekmarch @johnpoz
                              last edited by

                              @johnpoz I will be sure to keep that in mind next time I need help.

                              I guess i'll have to research what other options I might have if I want to block random devices from my LAN.

                              Thanks again, everyone, for all the help

                              johnpozJ D 2 Replies Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @derekmarch
                                last edited by johnpoz

                                See my edit to your question about devices on the same network.

                                Vlans are very handing for keeping device X from talking to Y - because you just put them in different vlans. Grouping like devices together that you want to talk to each other, etc and other devices that you don't want talking to other devices in their own vlan - but they would be able to talk amongst them selves on that vlan.

                                To keep devices on the same network from talking to each other - wired this is normally called a private vlan. In wireless its called client or ap isolation.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • D
                                  derekmarch @derekmarch
                                  last edited by

                                  @derekmarch

                                  Hm, I do have a managed switch that I'll be configuring soon. I guess I'll setup a rule at that time to move this alias to its own VLAN.

                                  Thanks

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @derekmarch
                                    last edited by

                                    Yeah any smart switch should be able to do vlans - not all entry level smart switches would support stuff like private vlans though..

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.