Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfsense not in the frontier

    Scheduled Pinned Locked Moved Firewalling
    5 Posts 2 Posters 491 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • U Offline
      Utilizador_Estagio
      last edited by

      Hi,
      Is it possible to put pfsense in a network, and it is securing anyother machine in the same network it is ?
      Simple put:
      In a hipotetical network (192.168.1.0/24) we have 3 machines: pfsense (WAN add -> 192.168.1.1), pc_A(192.168.1.2), and pc_B (192.168.1.3). With this configuration, pfsense can provide security (filtiring, blocking, etc) to pc_A and pc_B ?

      1 Reply Last reply Reply Quote 0
      • johnpozJ Offline
        johnpoz LAYER 8 Global Moderator
        last edited by

        No.

        Not unless the L2 connection between pcA and pcB went through a bridge on pfsense.

        How many interfaces does this pfsense box have?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

        U 1 Reply Last reply Reply Quote 0
        • U Offline
          Utilizador_Estagio @johnpoz
          last edited by

          @johnpoz
          It has 6 interfaces. But i am testing several possibilities with pfsense.

          1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            If you need to filter pcA and pcB, then you should normally put them on different networks.

            There is little reason to but devices on the same network if your wanting to firewall traffic between them. If a box is on a hostile network, ie you want to put it behind a firewall from stuff on its own network then this is when host firewall becomes handy..

            Or you isolate the boxes via your switch.. Like say with private vlans. Or if wireless clients would use client isolation on your AP.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

            U 1 Reply Last reply Reply Quote 0
            • U Offline
              Utilizador_Estagio @johnpoz
              last edited by

              @johnpoz

              As always, u r very helpful.
              Appreciate.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.