Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense as front end for /24

    Scheduled Pinned Locked Moved Routing and Multi WAN
    8 Posts 4 Posters 1.3k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • U Offline
      unsichtbarre
      last edited by

      OK, I need to use pfSense as a front end for my public /24 based on the fact my ISP is handing off a router allocation of /29 (https://forum.netgate.com/topic/166652/24-from-cogent/6)

      Would I simply put the WAN on the /29 and the LAN on .1 0f my assigned /24 (38.94.61.0/24 ) and then create permit all rules from WAN>LAN and LAN>WAN?

      Or would I disable firewall and turn pfSense into only a routing platform?

      Could it me that simple?

      THX,
      -J

      NogBadTheBadN S 2 Replies Last reply Reply Quote 0
      • NogBadTheBadN Offline
        NogBadTheBad @unsichtbarre
        last edited by NogBadTheBad

        @unsichtbarre I'd be tempted to do a 1:1 nat with just part of your /24 if the servers are running apps that are NAT friendly if you can:-

        https://docs.netgate.com/pfsense/en/latest/nat/1-1.html#example-ip-address-range-1-1-configuration

        38.94.61.1 -> 192.168.1.1
        38.94.61.2 -> 192.168.1.2
        38.94.61.3 -> 192.168.1.3
        etc ...

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        1 Reply Last reply Reply Quote 0
        • S Offline
          SteveITS Rebel Alliance @unsichtbarre
          last edited by

          @unsichtbarre So the /24 is the LAN subnet? The WAN would be one IP in the /29 and the LAN IP 38.94.61.1/24 or whatever IP you want. Your ISP routes the /24 subnet to your WAN IP, and pfSense will route that to the LAN network. Similar to NAT but without the actual translation. We have this setup in our data center (though with two routers in an HA setup).

          If you add a permit all rule from any to LAN then that would effectively disable the firewall and allow all inbound traffic from the Internet. You could also just allow/disallow traffic as desired. (you wrote "WAN>LAN" but that's not necessary as the only thing besides pfSense in the WAN /29 network is the WAN gateway, unless you want that IP to have access to your LAN)

          There should be a default allow LAN to any rule.

          Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
          Upvote ๐Ÿ‘ helpful posts!

          U 1 Reply Last reply Reply Quote 0
          • U Offline
            unsichtbarre @SteveITS
            last edited by

            @steveits Great, thanks! Could I just disable firewall in advanced settings?

            S johnpozJ 2 Replies Last reply Reply Quote 0
            • S Offline
              SteveITS Rebel Alliance @unsichtbarre
              last edited by

              @unsichtbarre Sure, I suppose. That's a separate question than how to set up the interfaces/routing but if you don't want a firewall, go ahead.

              Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
              Upvote ๐Ÿ‘ helpful posts!

              U 1 Reply Last reply Reply Quote 1
              • U Offline
                unsichtbarre @SteveITS
                last edited by

                @steveits thanks, it's not so much that I don't want to firewall, but I would like to create a reliable front end for my /24 with pfSense, and then do stateful packet inspection downstream with other firewalls including pfSense.

                S 1 Reply Last reply Reply Quote 0
                • S Offline
                  SteveITS Rebel Alliance @unsichtbarre
                  last edited by

                  For whatever it's worth, just saw this in another thread
                  https://docs.netgate.com/pfsense/en/latest/recipes/route-public-ip-addresses.html

                  Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                  Upvote ๐Ÿ‘ helpful posts!

                  1 Reply Last reply Reply Quote 1
                  • johnpozJ Offline
                    johnpoz LAYER 8 Global Moderator @unsichtbarre
                    last edited by johnpoz

                    @unsichtbarre said in pfSense as front end for /24:

                    Could I just disable firewall in advanced settings?

                    You could - but now you just exposed pfsense web gui, ssh etc to whatever can talk to any IP on the box.. Disable the firewall might be an option for some internal use of pfsense as just router. But not something I would suggest for when its routing public IP space.

                    As mentioned in another thread - just use any any if you want to just route.. There is no advantage to disable the firewall aspects unless its performance related - and if your box can not route your traffic at speed with firewall enabled then it undersized anyway.

                    Then you can at least filter who can talk to the pfsense gui, etc.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07 | Lab VMs 2.8, 25.07

                    1 Reply Last reply Reply Quote 1
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.