• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Setup management interface on separate network

Scheduled Pinned Locked Moved General pfSense Questions
8 Posts 4 Posters 1.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Y
    ymcan
    last edited by Nov 16, 2020, 4:00 PM

    Hello,

    I have seen quite a few similar questions, but no answers that help me so far. I have a pfSense setup with 4 network interfaces, 2x WAN (load balanced), 1x LAN (client network on 10.x.x.x) ip range, and a 4th interface, called MGMT, which I want to use to access the management GUI and SSH from our staff network 192.168.0.0/16. I have set the interface to a static IP 192.168.1.1/255.255.0.0 and I added two firewall rules (no routing to the internet or LAN on this network, and no DHCP):

    • allow access from 192.168.0.0/16 to port 22 and 443
    • block all other access

    However this does not seem enough to allow access to the management GUI, can anyone tell me what else I need to do please? (I was wondering if I need to tell pfSense to listen on 192.168.1.1, but I can't work out how to do that.)

    Thank you for your help, I am completely new to pfSense, so forgive me if I have overlooked something obvious.

    G 1 Reply Last reply Nov 17, 2020, 7:24 AM Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by Nov 16, 2020, 10:44 PM

      The webgui and ssh daemon listen on all IPs pfSense owns so you should be able to connect if rules allow it.
      You have multiwan. You might be policy routing traffic to the loadbalancing gateway group. If that catches traffic before the pass rule to the MGMT IP it will be sent out of the WAN(s) even if the destination is local.

      Can we see a screenshot of those firewall rules?

      Do you really need a /16 subnet there? 65,536 IPs?

      Steve

      1 Reply Last reply Reply Quote 0
      • G
        Gertjan @ymcan
        last edited by Gertjan Nov 19, 2020, 5:56 AM Nov 17, 2020, 7:24 AM

        @ymcan said in Setup management interface on separate network:

        192.168.0.0/16

        Great. Your staff would do management using one of the 65534 devices on the MGMT interface ??

        @ymcan said in Setup management interface on separate network:

        10.x.x.x

        Ok, I got it : a 16 million size LAN network ....

        Confirm that you work for a F500 company. If not, please make your live easier, and go to /24 on both networks. You will thank yourself later on.

        Put these 4 rules on your LAN firewall :

        ( edit : have to wait - can't upload right now... )
        edit again :

        Capture-0001.PNG

        Note : if your LAN uses IPv6, use "IPv4+6" instead.

        Ports 21,80 and 443 could be grouped in an alias, so you can set up one firewall rule blocking these ports.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        A 1 Reply Last reply Nov 17, 2020, 7:40 PM Reply Quote 0
        • A
          ahking19 @Gertjan
          last edited by ahking19 Nov 17, 2020, 7:41 PM Nov 17, 2020, 7:40 PM

          @Gertjan Are these block rules (looking at the description - ie "Block SSH")? They look like allow rules.

          G 1 Reply Last reply Nov 18, 2020, 7:18 AM Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Nov 17, 2020, 9:32 PM

            Mmm, they are allow....

            1 Reply Last reply Reply Quote 0
            • G
              Gertjan @ahking19
              last edited by Gertjan Nov 18, 2020, 7:28 AM Nov 18, 2020, 7:18 AM

              @ahking19 said in Setup management interface on separate network:

              They look like allow rules.

              Nice catch.
              When making the image, I wouldn't lock myself out while doing so, so I edited the image - and finally posted the wrong one.
              Corrected.
              ( well .... Error Something went wrong while parsing server response)

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 1
              • Y
                ymcan
                last edited by Nov 20, 2020, 12:00 PM

                I am currently working from home and don't have access to the client network from here, so I will post an image of the firewall rules as soon as I can get to that again. (I can get onto the staff network, but if I could get to the firewall rules from there, I would not have written this post. 😞 )

                As for the size of the ip ranges.

                • The 10.x.x.x was a typo it should have said 10.1.x.x, I have up to 400 devices on the client network and so /24 would not cover it. I know I could have done /23 or /22, but I was lazy, and in a hurry to get this up and running.

                • The staff network spans several sites, and the IP ranges are different on every site, 192.168.0.x - 192.168.15.x, so again not the full /16 range, but me be lazy.

                I will post those firewall rules as soon as I get back on site. That might be a few weeks though.

                1 Reply Last reply Reply Quote 0
                • S
                  stephenw10 Netgate Administrator
                  last edited by Nov 20, 2020, 2:11 PM

                  If it's a supernet to include a number of subnets that's fine. As long as there is a reason for using it.
                  You'd be surprised how many people believe there are only 3 private subnets available. 😉

                  Steve

                  1 Reply Last reply Reply Quote 1
                  8 out of 8
                  • First post
                    8/8
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                    This community forum collects and processes your personal information.
                    consent.not_received