Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Rule check

    Scheduled Pinned Locked Moved Firewalling
    5 Posts 2 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      bilbo
      last edited by

      home user network

      I added an additional lan today, but was having some issues with devices being redirected to cyberghost vpn on each lan not being able to access the oher lan properly, all seems okay now but are these rules ok?

      Could I consolidate the cyberghost rules with an inverted destination !lanx ?

      Selection_001.png
      Selection_001.png_thumb
      Selection_002.png
      Selection_002.png_thumb

      1 Reply Last reply Reply Quote 0
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        So you have hosts in the alias CyberghostClients that are present on both LAN and LAN2?

        That's a little odd but should work.

        What you have there looks fine. What, exactly, isn't working?

        Please be specific. We'll need to talk about specific IP addresses that cannot reach specific IP addresses. You probably don't need to be concerned about hiding details of your inside network.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          Regarding blocking kids based on a scheckule you should pass according to a schedule followed by a block any, but that is a separate issue probably. If that is working for you, great.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • B Offline
            bilbo
            last edited by

            Thanks for the tips, it seems to be working okay thanks, I just wanted to make sure that I had not made any home networking security faux pas really.

            Re the cyberghost alias, yeah I just added to the existing rather than create a separate one and it does seem to be okay.

            The issue I had been having was the clients within the cyberghost alias on each lan could not communicate properly with the other lan presumably because they were being forced through the cyberghost gateway.

            To solve this I added an additional cyberghost rule above the existing ones with the respective lans as the destination and no forced gateway which seems to have cured the problem.

            1 Reply Last reply Reply Quote 0
            • DerelictD Offline
              Derelict LAYER 8 Netgate
              last edited by

              The need to bypass policy routing is expected:

              https://doc.pfsense.org/index.php/Bypassing_Policy_Routing

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.