Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow Subdomains of a domain

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 5 Posters 1.3k Views 6 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ Offline
      johnpoz LAYER 8 Global Moderator @KOM
      last edited by johnpoz

      @kom said in Allow Subdomains of a domain:

      why are you locking it down so tightly?

      I would have the same question to be honest. Guest network is almost always isolated from your other network(s).. So who really cares where they go, you could just use same filtering you do for your own network to help prevent malware, bad stuff sort of thing.

      One thing that comes to mind is maybe to keep these guests from sucking all your bandwidth. That might be better accomplish by just rate limiting the amount of bandwidth the guests can use from your total available bandwidth.

      From what I read on the signal site, I think the wildcards are more suited if using a proxy. They state since the IPs change that firewall rules could be difficult, but suggest to fqdn that could be used.

      The underlying IPs are constantly changing, so it'd be hard to define accurate firewall rules.  
      
      If the wildcard FQDN config is not working properly and you notice issues with calling, allow turn2.voip.signal.org and sfu.voip.signal.org. These are subject to change at anytime.
      

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 25.07 | Lab VMs 2.8, 25.07

      1 Reply Last reply Reply Quote 0
      • S Offline
        silmaril
        last edited by

        Maybe you are right and filtering too much in the guest network is not really the way to think about this.
        Separating it from the main network is the really important thing here.

        Thank you very much for not answering my question, but instead turning my thinking in a better direction ;-)

        JKnottJ 1 Reply Last reply Reply Quote 0
        • JKnottJ Offline
          JKnott @silmaril
          last edited by

          @silmaril

          Here are my guest network rules:

          5e1fdfc1-7a8d-423a-be77-31bdce3237a2-image.png

          They only allow access to the Internet and pinging the guest LAN interface.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          KOMK 1 Reply Last reply Reply Quote 0
          • KOMK Offline
            KOM @JKnott
            last edited by

            @jknott What is the purpose of your fourth rule?

            JKnottJ 1 Reply Last reply Reply Quote 0
            • JKnottJ Offline
              JKnott @KOM
              last edited by

              @kom

              Guests are not allowed to do anything to the WAN address. It is normally possible to reach the WAN address from the LAN side. That rule blocks that.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              KOMK 1 Reply Last reply Reply Quote 0
              • KOMK Offline
                KOM @JKnott
                last edited by

                @jknott Haha yes I figured what the rule does but I wanted to know why. What could they do that you would need to block it? Genuinely curious here as I've never seen such a rule used before.

                noplanN JKnottJ 2 Replies Last reply Reply Quote 0
                • noplanN Offline
                  noplan @KOM
                  last edited by

                  @kom

                  Ad rule... Same here...

                  But why allow guest to LAN?

                  1 Reply Last reply Reply Quote 0
                  • JKnottJ Offline
                    JKnott @KOM
                    last edited by

                    @kom

                    Just making sure they can't reach it at all. I am not aware of all possible attacks so it best to block everything that isn't needed.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ Offline
                      johnpoz LAYER 8 Global Moderator @JKnott
                      last edited by

                      Wouldn't it be easier and easier to see if you just used the "this firewall" alias?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      JKnottJ 1 Reply Last reply Reply Quote 1
                      • JKnottJ Offline
                        JKnott @johnpoz
                        last edited by

                        @johnpoz

                        I wasn't aware of that alias.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.