Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Accessing other devices on WAN

    Scheduled Pinned Locked Moved Firewalling
    6 Posts 3 Posters 785 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      sgmanuk
      last edited by

      I have a dell R510 running vmware, i have installed pfsense on there in the hope I can remove the hardware firewall and vpn to save power/space i have everything up and running and it seems to work well the only thing that has me stumped is on the LAN side i have an ip range 10.1.100.x sub net 255.255.255.0  on the WAN side I have an ip range  192.168.0.x subnet 255.255.255.0  the previous router pfsense is replacing would not allow the lan side to see  any other devices in the 192.168.0.x range on the WAN side which is what I wanted only access to the internet gateway on 192.168.0.1 ,  where as pfsense seems to allows these devices to be seen, any ideas as to what is causing this?

      E.g on in my browser on the LAN side i can type in 192.168.0.23 and see that machine which in the past would not happen.

      to add, I basically want to lock it down so that the WAN and LAN are separate WAN to LAN only has port forwarding static rules and  LAN TO WAN the usual NAT the way a home router behaves, LAN devices see each other and only outbound internet to WAN.

      Many thanks,

      Shaun.

      1 Reply Last reply Reply Quote 0
      • V Offline
        viragomann
        last edited by

        pfSense has a default allow any to any rule on LAN interface and doesn't restrict the access to a certain gateway.

        If you want to prevent access to 192.168.0.0/24 add a block rule with that destination to the top of the LAN rule set.

        1 Reply Last reply Reply Quote 0
        • johnpozJ Offline
          johnpoz LAYER 8 Global Moderator
          last edited by

          ^ exactly.

          But I am curious why you would have anything on this network between your pfsense wan and your isp router.. Why not just put everything behind pfsense?  And if you want to control access between networks just simple firewall rules vs natting and using port forwarding between rfc1918 space.

          The network between your isp and or your router if your having to double nat with pfsense should be a transit network.  There should be little reason to put devices on this network.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.11 | Lab VMs 2.8.1, 25.11

          1 Reply Last reply Reply Quote 0
          • S Offline
            sgmanuk
            last edited by

            many thanks Guys,  the server is in a home setup with the rest of the house on the 192.168.0.x ,  my development boxes are on 10.100.1.x  I have been using another router to separate them in the past but now moved to pfsense.

            I am going to apply this same setup in the datacenter since we need to downsize the rack for the production enviroment. This will not have another ISP router / local ip address  as the WAN but a live public IP out to the internet.

            I wanted to get to grips with PfSense at home before I did this, will look at how the any/any rules work since I do not want other public IP in the datacentre being able to access the LAN  which sounds like what the any/any rules does… more reading up needed by the sounds of it! :-) Any tips you have would be great for this kind of application.

            1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator
              last edited by

              "I do not want other public IP in the datacentre being able to access the LAN  which sounds like what the any/any rules does"

              No that is not what any any rules does on LAN… Any any rule on lan allows the lan of pfsense to go anywhere it wants.  There is no such rule on the WAN.. So unsolicited traffic inbound to your WAN would not be able to go anywhere..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.11 | Lab VMs 2.8.1, 25.11

              1 Reply Last reply Reply Quote 0
              • S Offline
                sgmanuk
                last edited by

                Excellent exactly what I need :-) Many thanks for your help.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.