Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN SSL and IP on WAN interface

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 3 Posters 985 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      reynold
      last edited by reynold

      Hi, what kind of IP should i put on WAN interface on pfSense?
      Shoul I put public IP provided by ISP?
      Or should I put private natted IP by router?
      My ISP gave me 6 public addresses an enabled NAT on router.
      I would like to use private natted IP on WAN interface on my pfSense? (i.e.192.168.40.1/24)
      Now i'm using public IP but i am thinking that it's not safe becuause my pfSense is reachable by external on public Ip address on port 1234

      DaddyGoD 1 Reply Last reply Reply Quote 0
      • DaddyGoD
        DaddyGo @reynold
        last edited by DaddyGo

        @reynold said in VPN SSL and IP on WAN interface:

        Shoul I put public IP provided by ISP?

        Hi,
        This is the best you can do... ๐Ÿ˜‰ (public IP on WAN)
        Why do you want to give yourself a headache, because of the problems which is dual-NAT gives you?

        @reynold "Now i'm using public IP but i am thinking that it's not safe becuause my pfSense is reachable by external on public Ip address on port 1234"

        this is not the best for "remote admin solution = MGMT access" USE THIS PLS.:

        VPN for MGMT:

        https://docs.netgate.com/pfsense/en/latest/recipes/remote-firewall-administration.html

        Rule of thumb:

        Do not open a port on the firewall (manually) unless absolutely necessary...

        Cats bury it so they can't see it!
        (You know what I mean if you have a cat)

        R 1 Reply Last reply Reply Quote 1
        • R
          reynold @DaddyGo
          last edited by

          @daddygo Thanks for your reply
          Usually i put public IP on WAN and for remote management i allow access via HTTPS to the firewall and also for VPN SSL. Usually i also change default port 443 with 5432 or something like that.
          I need to manage the firewall remotely and my worry is that the firewall is accessible from internet with public IP so I was thinking to use natted IP on wan interface.
          That's the reason.
          I understand that best solution is allow HTTPS access and restrict access rather than use natted IP.

          johnpozJ DaddyGoD 2 Replies Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @reynold
            last edited by

            Nat is not really a security aspect.. While if port X is only forwarded to pfsense rfc1918 wan ip it would keep pfsense logs free of noise.

            While nat can be seen as preventing traffic to any port on your device, and could be beneficial if your device doesn't have a firewall and ports you don't want exposed could be exposed if not behind a nat.

            Out of the box all unsolicited traffic to pfsense wan is dropped out of the box anyway.

            If your exposing service xyz to the public internet - doesn't really matter if natted or not from a security point of view.

            I wouldn't expose the pfsense gui to the public internet be it natted or not, unless you could lock down the source IP to your known IP your coming from.

            Its best for remote admin to vpn in..

            Nat or Napt in general should not be seen as a security feature..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            DaddyGoD 1 Reply Last reply Reply Quote 1
            • DaddyGoD
              DaddyGo @reynold
              last edited by DaddyGo

              @reynold said in VPN SSL and IP on WAN interface:

              I need to manage the firewall remotely and my worry is that the firewall is accessible from internet with public IP so I was thinking to use natted IP on wan interface.

              The firewall (NGFW) by default, all traffic is rejected DROPPED on the WAN interface.

              so don't worry until you start opening unnecessary ports to the world

              Instead of HTTPS, I would still recommend a VPN solution for remote management, something like this:

              6a354c1d-64aa-4b0c-bc7b-ea997e38fdf0-image.png

              15377421-975d-41c2-a813-bce2d489365e-image.png

              Cats bury it so they can't see it!
              (You know what I mean if you have a cat)

              1 Reply Last reply Reply Quote 1
              • DaddyGoD
                DaddyGo @johnpoz
                last edited by

                @johnpoz

                Oops cross-posted, almost the same ๐Ÿ˜‰

                Cats bury it so they can't see it!
                (You know what I mean if you have a cat)

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @DaddyGo
                  last edited by

                  @daddygo hehe - yeah pretty close.

                  Small edit I would suggest for you

                  by default, all traffic is rejected on the WAN interface.

                  Not technically correct - the traffic is not "rejected" its dropped.. Reject on wan is almost always a bad idea.. Why would you send back a RST, you would want to just drop/ignore the traffic.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  DaddyGoD 1 Reply Last reply Reply Quote 0
                  • DaddyGoD
                    DaddyGo @johnpoz
                    last edited by DaddyGo

                    @johnpoz said in VPN SSL and IP on WAN interface:

                    the traffic is not "rejected" its dropped.

                    True :)

                    ++edit:
                    The DeepL spellchecker has replaced the words

                    Cats bury it so they can't see it!
                    (You know what I mean if you have a cat)

                    R 1 Reply Last reply Reply Quote 1
                    • R
                      reynold @DaddyGo
                      last edited by

                      @daddygo @johnpoz
                      Thank you guysโœŠ

                      So, just for recap:

                      1. public IP on WAN interface
                      2. VPN solution for remote management as @DaddyGo explained

                      I abolutely agree with you when you says to not expose pfsense gui on internet. That is exactly what I want to obtain.

                      Now i know how i can do that! I will use VPN solution instead using HTTPS on a specific port.

                      That's absolutely the best way, instead HTTPS or NAT.

                      Thanks again,

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @reynold
                        last edited by

                        You can run your vpn over 443 if you want.. I do - since 443 is almost always open no matter where your coming from, and you can even bounce it off a proxy (say at your work location)..

                        I even share this port with other services available to the public, via haproxy.. So my users can request movies for my plex ;) via that service. Haproxy does the ssl offload for that even. And using sni restrictions - if they don't send the correct fqdn, say some bot just hitting my ip on 443.. haproxy would not send the traffic through to my request service.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        DaddyGoD R 2 Replies Last reply Reply Quote 1
                        • DaddyGoD
                          DaddyGo @johnpoz
                          last edited by

                          @johnpoz said in VPN SSL and IP on WAN interface:

                          443.. haproxy

                          We use exactly this solution for our IceCast2 servers running behind pfSense, -cool stuff ๐Ÿคš

                          Cats bury it so they can't see it!
                          (You know what I mean if you have a cat)

                          1 Reply Last reply Reply Quote 0
                          • R
                            reynold @johnpoz
                            last edited by

                            @johnpoz said in VPN SSL and IP on WAN interface:

                            You can run your vpn over 443 if you want.. I do - since 443 is almost always open no matter where your coming from, and you can even bounce it off a proxy (say at your work location)..

                            OpenVPN use 1194 port by default isn't it?
                            Can i run VPN also on 443?

                            DaddyGoD 1 Reply Last reply Reply Quote 0
                            • DaddyGoD
                              DaddyGo @reynold
                              last edited by DaddyGo

                              @reynold said in VPN SSL and IP on WAN interface:

                              OpenVPN use 1194 port by default isn't it?

                              Yes and no, you can put it anywhere you like either to 50-60K too

                              550fc607-b5d7-464e-aeca-aa45ab0748a5-image.png

                              Yes 443 also works :-)

                              ++++edit:

                              John @johnpoz suggested 443 because it is the HTTPS port.
                              Therefore it is always open and this is not restricted by the ISPs, because it would be pointless

                              Cats bury it so they can't see it!
                              (You know what I mean if you have a cat)

                              johnpozJ 1 Reply Last reply Reply Quote 1
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @DaddyGo
                                last edited by johnpoz

                                yeah the default udp port is 1194, this could quite often be blocked from where your at... 443 never going to be blocked if internet is open. even they are forcing traffic through a proxy you can still get your vpn connection over the proxy on 443.

                                udp is normally a best choice for the vpn - but hey if it doesn't work tcp over 443 is pretty much guaranteed to work - even if not optimal connection, etc.

                                You can run both, I run a tcp 443 instance along with a 1194 udp instance.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 1
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.