• 0 Votes
    3 Posts
    972 Views
    imark77I

    edit:
    on the SG-3100 I have determined that I did not have the switch ports assigned/enabled to any vlans and after that it gave me DHCP on the lan ports and vlans. however I am still with the issue of some devices getting IP's and some not, on the same laptop over Wi-Fi nothing wired something. My travel AP does not support vlans so it has to be on the base level. and none of my non-Mac computers seem to be getting DHCP. And I don't know what caused it but I managed to crash my old router and ALL INTERNETs last night plugging in the new one to do a test. I went out and bought 4 manageed switches so I could break out all of my VLANs to test, and it was the only ez way to solve ingesting my multiple travel WAN VLANS ( local lan, Wi-Fi, Wi-Fi hotspot, wired LTE modem).

  • 0 Votes
    2 Posts
    1k Views
    S

    If you set pfBlocker to "native alias" instead of block, that will just create an alias and you can create your own block/allow rules however you want them.

  • 0 Votes
    21 Posts
    3k Views
    T

    @mickman99 Sorry mal wieder die späte Rückmeldung. Habe jetzt Urlaub und kann mich dem Thema wieder expliziter widmen.

    Tatsächlich wird der Präfix einwandfrei auf die Interfaces verteilt und stimmen auch mit dem Präfix mit dem der FRITZ!Box überein. Laut Log der FRITZ!Box wird das verteilte Netz an das LAN Interface auch erkannt und als Exposed Host freigegeben.

    Ich vertraue allerdings der Firewall der FRITZ!Box nicht so ganz. Ich richte parallel bei einem Nachbar einen OpenVPN Server über IPv6 ein. Auch dort wird der eingehender Verkehr trotz Exposed Host (natürlich nur zum Test so freigegeben) rejected. Sinn macht das nicht.

    Zusätzlich ist bei meiner pfsense das Problem aufgetreten, wenn viele Daten auf einmal verarbeitet werden müssen, dass der interne DNS Server abschmiert. Da habe ich auch die Vermutung, dass es an der FRITZ!Box liegt. Der Log der Fritte verrät da allerdings nicht so viel...

  • Rules from VLAN to LAN and back

    Firewalling
    5
    0 Votes
    5 Posts
    981 Views
    P

    I will check it in the evening. A t this time only linux machines are there and I don't want to allow the windows machines to serve some services.

    Anyway, LAN network doesn't know anything about VLANs, where the host to be connected from VLAN20 is located ....

  • OpenVPN Static Ip, Routing Problem, NAT

    OpenVPN
    17
    0 Votes
    17 Posts
    2k Views
    ?

    @Derelict I think i got it to work. After i set the default gateway manually to the VPN and not automatic and saw that it worked,
    i transfered the Flowing Rule i made for the outbound traffic to the Lan interface.
    With the new knowledge of your help and the help of viragomann i changed some tiny things in the firewall rule.
    After that i changed the default gateway back to automatic and know the outbound traffic takes the vpn and everything works.
    I even rebootet the firewall to get lost of the states but everything still functions as it seems.

    Thank you so very much for your dedication and your help.

  • Difference between NAT (port forward) and just open a port

    NAT
    5
    0 Votes
    5 Posts
    895 Views
    P

    @johnpoz
    I see. Thanks for your help as well! Appreciated.

  • how to narrow access for a openvpn user

    OpenVPN
    4
    0 Votes
    4 Posts
    801 Views
    GertjanG

    Added to what @NogBadTheBad said :

    Start up a new OpenVPN server on - example - port 1195.
    Assign this user - his credentials - to this VPN.
    Assign the OpenVPN interface of this instance to an Interface.
    Now you can use this firewall for this interface to fine-grain the access on IP "destination".

    When a user comes in using a VPN, he can access - typically - your LAN(s). But all devices on these LANs have their own access codes.
    The server your user should access has it's own user privileges set up, right ?

    Btw : put your server on a DMZ ....

  • Multiple problems with NAT rule creation UI

    webGUI
    5
    0 Votes
    5 Posts
    1k Views
    johnpozJ

    @DavidGA said in Multiple problems with NAT rule creation UI:

    You apparently can't create NAT rules for destination port ranges

    Huh? Sure you can..

    portforwards.png

    But yeah concur with JeGr if you were going to do that you would just use a 1:1 nat.

    I don't have a mac to test with - but for sure could test it with multiple browsers on windows or linux..

    Let me fire up safari on my iphone or ipad..
    edit: Just fired it up on my iphone and works just fine.. When selected network as address the box did turn gray, but just clicked on it and it went white and could enter stuff..

  • Understanding Firewall Configuration

    Firewalling
    1
    0 Votes
    1 Posts
    476 Views
    No one has replied
  • Firewall rule name in logs

    Firewalling
    2
    0 Votes
    2 Posts
    1k Views
    A

    Technically, these are NOT called rule names, but descriptions instead.

    The description of my firewall rules (on LAN is where I'm logging) are in my firewall logs. If you've got no rules created, you'll have to make some that actually log the data. After that, if you look in Status -> System Logs -> Firewall in the Rule column it lists the rule description(s).

    There's also the 10 digit unique (I think) tracking ID code to make them quick to find or index.

    The only restriction listed for rule descriptions is max of 52 characters. Don't know anything about special characters, however. Here's some talk about some description stuff.

    https://forum.netgate.com/topic/92254/firewall-rule-description-length-limitation

    Jeff

  • 0 Votes
    4 Posts
    1k Views
    jimpJ

    It might be an edge case we can't really detect well since it may be valid in some other way, even if it isn't an IP address (e.g. a hostname, other alias name, etc)

  • 0 Votes
    2 Posts
    672 Views
    N

    Solved..... I spent 2 weeks to find this issue, posted here... then I cleared my cache and it did the trick.

  • 0 Votes
    2 Posts
    2k Views
    bmeeksB

    The Suricata GUI package on pfSense is designed to make the deployment of an IDS/IPS somewhat simpler for users new to such technology. If you are at an advanced level where you want to integrate with multiple other systems and construct on-the-fly rules using script tools, then you really should abandon the GUI part of the package and simply use the Suricata binary itself. You can do that by simply installing Suricata from FreeBSD ports. You are going to have to install all of the other scripting language dependencies from there anyway.

    I am not in favor of loading up the Suricata package with a ton of new dependencies when the vast majority of users would likely not need them for a basic IDS/IPS. I'm talking about things like Python, Go, (and heaven forbid one old suggestion even needed Java! Can you imagine the security holes your firewall would have with Java installed on it?).

    There is a Github site for all of the pfSense packages here. You are free to submit pull requests there. I usally am asked for my opinion, but the pfSense developers have final say in what is accepted into the package.

  • 0 Votes
    4 Posts
    1k Views
    DerelictD

    Using LAN is OK as long as you understand that you almost certainly shouldn't put anything but other routers with full infrastructure routing knowledge on LAN.

  • 0 Votes
    2 Posts
    806 Views
    NogBadTheBadN

    Tried killing the firewall states ?

  • 0 Votes
    7 Posts
    1k Views
    P

    @chris4916
    Merci pour les infos, j'ai entrevu ce genre de possibilités dans différents articles sur pfsense ces derniers jours, il me semble effectivement qu'il y a du potentiel.