Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense behind ISP Router

    Scheduled Pinned Locked Moved Routing and Multi WAN
    16 Posts 5 Posters 8.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM @networkingpeasant
      last edited by

      @networkingpeasant You don't need a port forward. You need to go to Interfaces - WAN and uncheck the Block private networks and loopback addresses box.

      Next, go your Firewall - Rules. Select the WAN tab. Add a Pass rule for Source 192.168.2.68, Destination This Firewall, Dest Port 80 or 443 depending on what you configured WebGUI to use.

      N 2 Replies Last reply Reply Quote 1
      • N
        networkingpeasant @KOM
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • mr.roshM
          mr.rosh
          last edited by mr.rosh

          Go, Interfaces, WAN, right at the bottom,
          6bd627d2-c69e-44b8-8c45-456363b2c708-image.png

          untick those two options.

          save and apply

          then in Firewall | Rules, LAN Tab, create rules where source is your LAN network and destination is ur wan ip addresses, and allow ports/protocol as required.

          save | apply and test

          N 1 Reply Last reply Reply Quote 0
          • N
            networkingpeasant @mr.rosh
            last edited by

            @mr-rosh No luck

            1 Reply Last reply Reply Quote 0
            • N
              networkingpeasant @KOM
              last edited by

              @kom No luck either

              Bob.DigB 1 Reply Last reply Reply Quote 0
              • Bob.DigB
                Bob.Dig LAYER 8 @networkingpeasant
                last edited by

                @networkingpeasant Don't connect anything other then the pfsense to the isp-router.

                N 1 Reply Last reply Reply Quote 0
                • N
                  networkingpeasant @Bob.Dig
                  last edited by

                  @bob-dig I will unplug the PC from the modem and into my switch (which is behind the firewall)
                  There are still 2 clients connected to the modem but i do not need access to them, will it affect them is anyway?

                  mr.roshM 1 Reply Last reply Reply Quote 0
                  • mr.roshM
                    mr.rosh @networkingpeasant
                    last edited by

                    @networkingpeasant technically to avoid further issues, move all devices off modem [except pfsense], and plug them into switch and ensure they are on 192.168.31.x ip range. reset should painless.

                    GertjanG 1 Reply Last reply Reply Quote 0
                    • GertjanG
                      Gertjan @mr.rosh
                      last edited by Gertjan

                      @networkingpeasant

                      pfSense behind ISP Router

                      That kind of setup is not rare, I guess it's even the most common.

                      My ISP router uses 192.168.10.1/24 - pfSense obtains on it's WAN interface 192.168.10.3, because it's using the default DHCP client on WAN.

                      I can visit the GUI of my ISP router just fine : 192.168.10.1 :

                      790ea68b-dc41-4406-a225-15d1b7291454-image.png

                      If I was connecting some other device like a PC to my ISP router (it has a 4 port LAN switch), it would obtain an IP like 192.168.10.x/24 and I would be able to ping this device from behind pfSense.

                      My pfSense WAN firewall rules :

                      3c4b45f3-cdfe-4a3f-ad1a-3fba9fe97b5c-image.png

                      The first rule : my pfSense WAN IP (192.168.10.3) replies to ping. This is purely optional.
                      The second rule is my OpenVPN access from the outside world. My ISP router has the same NAT rule (entering UDP port 1194 to the IP of pfSense).
                      The third rule is sued for my "Munin" setup. Pure optionnal.
                      The last (4) rule is an explicit "block everything"

                      As said above : you should plac all your local devices behind pfSense.
                      You shouldn't even use the Wifi capabilities of your ISP router, place an AP behind pfSense and use that one.

                      There are exceptions : I have a TV box that has to be connected directly to the ISP box.
                      Some of us have a VOIP phone box, this should also be connected to the ISP router directly.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      N Bob.DigB 2 Replies Last reply Reply Quote 0
                      • N
                        networkingpeasant @Gertjan
                        last edited by

                        @gertjan said in pfSense behind ISP Router:

                        If I was connecting some other device like a PC to my ISP router (it has a 4 port LAN switch), it would obtain an IP like 192.168.10.x/24 and I would be able to ping this device from behind pfSense.

                        In this scenario, your pfSense is behind the ISP router which a PC is connected to, and you would be able to ping that PC from the pfSense LAN devices? For me my LAN is 192.168.38.x, and i cant ping any devices outside the firewall, which use 192.168.2.x

                        1 Reply Last reply Reply Quote 0
                        • Bob.DigB
                          Bob.Dig LAYER 8 @Gertjan
                          last edited by

                          @gertjan said in pfSense behind ISP Router:

                          The last (4) rule is an explicit "block everything"

                          Since when is this needed? 😨

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.