Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    1. Home
    2. Tags
    3. firewall rules
    Log in to post
    • All categories
    • L

      DNS Resolution of server failing... but I can ping the box?

      Watching Ignoring Scheduled Pinned Locked Moved WireGuard dns resolution firewall rules wireguard
      5
      0 Votes
      5 Posts
      1k Views
      L

      So, after some further digging, I discovered a couple things.

      You have to actually assign the tunnel to an interface The MacOS Wireguard app doesn't support .ddns.net domains

      Thank you for your help, once I assigned the interface correctly everything worked like a charm.

    • L

      DNS Resolution for Wireguard tunnel failing

      Watching Ignoring Scheduled Pinned Locked Moved DHCP and DNS dns firewall rules wireguard dns resolution
      3
      0 Votes
      3 Posts
      2k Views
      L

      @bob-dig Yes, I can ping the domain name and receive a response from the firewall.

    • G

      Disable firewall rules from mobile browser: can't scroll

      Watching Ignoring Scheduled Pinned Locked Moved webGUI bug web ui firewall rules
      4
      0 Votes
      4 Posts
      1k Views
      G

      @gianpaoloracca UPDATE:
      you can scroll dragging the column header.
      So it's clunky but it works.

    • U

      Block Internal vLan from accessing Web UI

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules pfsense
      14
      0 Votes
      14 Posts
      2k Views
      johnpozJ

      @unififcf said in Block Internal vLan from accessing Web UI:

      they said it is a TrueNAS

      Ah - yeah they do not have a "gui" to admin it, but you can for sure configure ipfw on it and manually setup the rules. Haven't played with that in long time.

      But ipfw can be its own learning curve for sure - yeah best to move that to different vlan than all your users and just use pfsense.

    • M

      How do you configure pfSense to connect its WAN port to a %G hotspot

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling bogon hotspot firewall rules
      5
      0 Votes
      5 Posts
      1k Views
      M

      @steveits Thanks again. I will try it one more time. My hot spot has a different subnet than the internal networks. It seems really strange that I can't ping my hot spot from either on of my internal networks.

      Thanks

    • C

      Ipsec established but no data passing

      Watching Ignoring Scheduled Pinned Locked Moved IPsec ipsec firewall rules firewall ipv4 vpn tunnel
      2
      0 Votes
      2 Posts
      946 Views
      perikoP

      @craigerr1 is P2P? Mobile?
      Have u open the rules in both sides to allow traffic on your firewalls->rules->ipsec?
      Regards!!!

    • R

      Isolate Secure LAN, Different IP Range, Management VLAN, Lab LAN

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling secure lan management vlan firewall rules block outbound
      5
      0 Votes
      5 Posts
      3k Views
      R

      @johnpoz Thank you so much again. Understand all.

      Couple of clarifications:

      Yes, understood, I was looking to be able to access pfsense and the LAN, but not the internet, in this instance. Either way, everything you said helped clarify it for me and I both understand it and got it configured and working. :))

      2a. Mine is manual, but yes, great points and idea.
      The allow rule you are referring to, would be an allow any and the gateway or default gateway correct?

      Correction: Vlan 1 includes all ports as members, then port 1 (trunk) is tagged in every vlan. Is that correct configuration?

      Also, on one of the switches I am looking at (all are good, one is high-end) I noticed that VLAN 1 (under its VLAN ID tab in membership), is an untagged member in every port as well. This includes ports with the assigned untagged VLAN also. That is incorrect?
      Should only be the vlan assigned to that port untagged, correct?

      Okay, and if a block egress rule in floating, that would go on the WAN or other gateway as previously discussed, correct?

      edit: 1 neither tagged nor untagged now in ports with other vlans untagged on them. All seems to be working, so thinking that is the correct config. :)
      Therefore, now not all ports are members on vlan 1, but port 1 (trunk) is tagged on each vlan on other ports.
      ex: VLAN ID. ** Port Member
      1 ** 1 17 27 (not a member of ports with vlans assigned untagged)
      10 ** 1 2 (vlan 10 U on port 2)
      Port 1 tagged on every vlan
      (formatting issue so had to use * to separate rather than columns)

    • R

      How to - Block and Filter Egress Traffic

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules egress port blocking
      12
      0 Votes
      12 Posts
      2k Views
      R

      @johnpoz Okay, all makes sense as always from you. Thank you.

      And yes, pfblocker is definitely on the list to learn and setup.

      Also: I just setup a new switch and it has brought me to one last issue I'm having trouble with regarding management and isolated LAN. Seems to be of interest from the posts I've read, but no real answers I've seen, so I am going to start another thread, easier to find related topic for others, with last questions for you. Hope you do not mind...

    • S

      Excessively High Firewall Maximum Table Entries

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules pfblockerng pfblocker memory high
      1
      0 Votes
      1 Posts
      934 Views
      No one has replied
    • R

      Help please: Why are these rules isolating IoT not working?

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling routing firewall rules iot guest
      34
      0 Votes
      34 Posts
      6k Views
      R

      Very thankful for this discussion. Provided a much greater understanding of many things and overall.

      For those reading: As to this specific issue, one that I saw many posts about, but this solution I have not seen:

      Just found this under logs-->firewall-->settings. I tested it and worked for the noise. Just don't know if will be losing any other and important logging with it. Looking at default block rules I do not think so, but not sure.

      Screen Shot 2021-09-28 at 08.20.10.png

    • R

      Test inter-LAN/VLAN Routing to Verify Firewall Rules

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling vlan firewall rules testing routing
      1
      0 Votes
      1 Posts
      614 Views
      No one has replied
    • T

      Wildcard Filtering

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules alias
      1
      0 Votes
      1 Posts
      576 Views
      No one has replied
    • P

      Not able to ssh to outside world (WAN)

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules
      11
      0 Votes
      11 Posts
      2k Views
      GertjanG

      @peter_apiit said in Not able to ssh to outside world (WAN):

      connect my company jumphost using ssh

      Can you change the settings of this ssh access ?
      Change the '22' port to '2222' and you'll be good.

    • V

      External ip and shodan show Port 80 open

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules webgui shodan wan ip ddns
      1
      0 Votes
      1 Posts
      725 Views
      No one has replied
    • F

      DNSBL not creating firewall rules

      Watching Ignoring Scheduled Pinned Locked Moved pfBlockerNG pfblockerng dnsbl firewall rules
      24
      0 Votes
      24 Posts
      5k Views
      F

      @bob-dig
      I temporarily disabled my feed and added reddit.com and www.reddit.com to the DNSBL Custom_List and the website (and others) is still not blocked. (Yes, I did a force update all)

      I have tried on different computers on the network and they can still access it.

      I have also tried on three different browsers.

      I am really confused why some sites are blocked while others are not.

    • D

      SG-5100: Running easyrule with dedicated user

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules sg-5100
      2
      0 Votes
      2 Posts
      635 Views
      D

      Turns out I need to "sudo" with my dedicated user for the command to work. Like this

      sudo easyrule block lan 192.168.1.21
    • L

      Unbound durch OpenVPN Client tunneln, sofern verfügbar

      Watching Ignoring Scheduled Pinned Locked Moved Deutsch vpn unbound firewall rules dns resolver openvpn client
      11
      0 Votes
      11 Posts
      2k Views
      Bob.DigB

      Musste leider feststellen, dass "meine" Lösung wohl nur eine gewisse Zeit funktioniert. Irgendwann scheint es so, dass Windows den "ersten" DNS-Server nicht mehr nutzt und daher interne Namen nicht mehr auflöst.
      Habe daher vorerst auf IPs umgestellt.

    • J

      Firewall Rules not applying to http traffic

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling firewall rules gateway routing
      9
      0 Votes
      9 Posts
      1k Views
      H

      @jack7076 transparent squid does not work with policy routing. Squid binds to wan. Policy routing is done before it reaches wan

    • P

      Auf Accesspoint hinter der Pfsense zugreifen

      Watching Ignoring Scheduled Pinned Locked Moved Deutsch firewall rules
      9
      0 Votes
      9 Posts
      1k Views
      P

      @NOCling @the-other ,

      das mit dem VLAN ist ne gut Idee, ich muss mir erstmal den switsch anschauen.
      (Ist ein kleiner HP 8 Port Gigabit switch)

      Werde mir das auf die todo Liste setzten wenn ich mal wider vor Ort bin.

      Wen der VLANs kann werde ich mich ggf. wegen der Konfiguration nochmal melden.

      Gruß Peter

    • imark77I

      Bridging physical interfaces and VLANs, geting DHCP with no routing? Or is it

      Watching Ignoring Scheduled Pinned Locked Moved L2/Switching/VLANs vlans bridging rules firewall firewall rules
      3
      0 Votes
      3 Posts
      991 Views
      imark77I

      edit:
      on the SG-3100 I have determined that I did not have the switch ports assigned/enabled to any vlans and after that it gave me DHCP on the lan ports and vlans. however I am still with the issue of some devices getting IP's and some not, on the same laptop over Wi-Fi nothing wired something. My travel AP does not support vlans so it has to be on the base level. and none of my non-Mac computers seem to be getting DHCP. And I don't know what caused it but I managed to crash my old router and ALL INTERNETs last night plugging in the new one to do a test. I went out and bought 4 manageed switches so I could break out all of my VLANs to test, and it was the only ez way to solve ingesting my multiple travel WAN VLANS ( local lan, Wi-Fi, Wi-Fi hotspot, wired LTE modem).