Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Antivirus

    Scheduled Pinned Locked Moved pfSense Packages
    8 Posts 4 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      reynold
      last edited by

      Hi, should i install antivirus such as ClamAv on my pfSense?
      I am going to do this because i did not install antivirus on client
      Could you provide me suggestion?
      thanks

      V 1 Reply Last reply Reply Quote 0
      • V
        vmb @reynold
        last edited by

        @reynold If you install the Squid proxy server package it installs ClamAV for you. It is worth installing to see if it does what you want to achieve.

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by bmeeks

          Unless you configure a full MITM (man-in-the-middle) setup to compensate for encrypted traffic such as HTTPS and POP3S/IMAPS (encrypted web traffic and email traffic), an anti-virus scanner on your firewall is close to useless. Scanning encrypted content in SSL web traffic and typical TLS email traffic doesn't work.

          You can configure trusted CAs, and manually reconfigure your client web browsers and email clients to trust those custom CAs, but it's a lot of work with many bumps in the road.

          Anti-virus protection is much better when deployed on the endpoint clients where encryption is no longer a problem. For example, pretty much all email traffic today is over TLS, so it's encrypted. An anti-virus scanner on your firewall can't look into the attachments of an email message as they flow by due to the encryption. So with no anti-virus protection on your endpoint client, when the user double-clicks that infected attachment on their PC, there is nothing to catch it and stop it.

          noplanN R 2 Replies Last reply Reply Quote 3
          • noplanN
            noplan @bmeeks
            last edited by

            @bmeeks

            And yes folks... That's why we use pfB instead og a man in the middle set up

            Not saying that anti virus protection on the client is useless but pretty bored all day

            1 Reply Last reply Reply Quote 0
            • R
              reynold @bmeeks
              last edited by

              @bmeeks said in Antivirus:

              Unless you configure a full MITM (man-in-the-middle) setup to compensate for encrypted traffic such as HTTPS and POP3S/IMAPS (encrypted web traffic and email traffic), an anti-virus scanner on your firewall is close to useless. Scanning encrypted content in SSL web traffic and typical TLS email traffic doesn't work.

              You can configure trusted CAs, and manually reconfigure your client web browsers and email clients to trust those custom CAs, but it's a lot of work with many bumps in the road.

              Anti-virus protection is much better when deployed on the endpoint clients where encryption is no longer a problem. For example, pretty much all email traffic today is over TLS, so it's encrypted. An anti-virus scanner on your firewall can't look into the attachments of an email message as they flow by due to the encryption. So with no anti-virus protection on your endpoint client, when the user double-clicks that infected attachment on their PC, there is nothing to catch it and stop it.

              Thank you, I replaced my old firewall with pfSense. My old firewall had bitdefender, and I noted pfSense does not have antivirus so I tought that I had to install it.
              But now i understand that it's pretty useless.
              When you talk about full MITM with CA you mean DPI SSL Deep Packet Inspection of SSL traffic?
              If yes, I need to install CA on every client.
              Is it worth doing it?
              I would like to try.
              @noplan
              What id pfb?
              Do you mean pfblocker?

              Thanks

              noplanN 1 Reply Last reply Reply Quote 0
              • noplanN
                noplan @reynold
                last edited by

                @reynold said in Antivirus:
                But now i understand that it's pretty useless]

                true statement for antiVirus on a firewall only working by a full "man in the middle attack"

                Is it worth doing it?

                as far as I am concerned NO ... more trouble, more cost for IT and testing, than the costs of the
                antiVir product on the client you're trying to replace

                Do you mean pfblocker?

                yes ... but if you try use the devel version !

                brNP

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by

                  I agree with @noplan. The hassle of setting up MITM and putting certs on all the clients (and maintaining the same) is more trouble than simply putting an AV client on the endpoints. If the endpoints are Windows boxes, just use the free Microsoft stuff. And there are certainly many paid options for AV.

                  A tool like pfBlockerNG-devel can also be helpful, but it requires some care in setting up the lists of IP addresses and domains to be blocked. Just blindly selecting a bunch of "bad IP Lists" to download and use is likely to cause you a lot of grief in the form of stuff breaking (web sites, streaming, etc.). Pick and choose carefully, and monitor things frequently so you can get ahead of any false-positive blocks.

                  noplanN 1 Reply Last reply Reply Quote 0
                  • noplanN
                    noplan @bmeeks
                    last edited by

                    @bmeeks said in Antivirus:

                    Pick and choose carefully, and monitor things frequently so you can get ahead of any false-positive blocks.

                    yeeeep ... nothing to add here !

                    and because it's always commin up ... do not start with an IDS/IPS system
                    start with pfBlocker and keep in mind what @bmeeks mentioned

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.