Route WAN to interface - simple pass everything through
-
Hi!
I have an SG-5100 which at the moment has an extra interface which I've named guest. I want to connect all traffic from guest to WAN with no pfSense interaction other then assigning a local IP address. So that to a system connected on 'guest' it would look like (or act like) they're just connected to public internet access.
I have pfBlocker and OpenVPN successfully configured and running well now. The reason for my temporary setup is that I think I may have pfblocker setup a little too well and it's intercepting something important (something that I have been unable to find in the logs) and I just want a to briefly, temporarily open flow to the internet with no filtering.
I -think- this is probably easy to do, but I have not been searching the forum for the correct key words.
Thank you for the help!
Gary
-
What rules do you have set up on the guest interface?
-
Hi John -
I'm not sure if pfSense has a nice text dump of the table, but to summarize, Guest has port 53 access to firewall (so that pfblocker can work) and all other port 53's are blocked. All other access to firewall is blocked. Then, Guest is blocked from LAN (the house PCs) and from WIFI and from VPN. Finally, guest has free access to everything else (which really just leaves WAN).
-
I've been poking through the forum a little more. I think what I'm after is a gateway between guest and WAN. The current firewall rules can be changed to support this test. I don't want to leave a totally open interface, just to set it up temporarily and to avoid pfBlocker on the interface.
-
I think what I'm after is a gateway between guest and WAN.
Usually the last visible rule created is what's allowed out. I say visible because the actual last rule is to block everything (built in / default rule).
So if you create a pass rule at the end of the list to allow, (your previous rules will block to LAN, WiFi, VPN) then you should be sweet.