Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    netgate 5100

    Scheduled Pinned Locked Moved General pfSense Questions
    22 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BlackBirdWilliams
      last edited by

      Good Afternoon,

      I have a work-from-home computer and would like to isolate it from my LAN devices.

      I have a Netgate 5100.

      All four physical ports are available with nothing plugged in. I also have express VPN and would like to have the work PC use this as well.

      My idea is to be able to physically connect the Laptop to one of the available ports, be isoloated from the rest of the lan. While using the express vpn. I dont want my lan to connect to express VPN or have any connection to the isolated work network.

      A little new to this and would greatly appreciate a guide as to how to establish this.

      Thank you in advance,

      BlackBirdWilliams

      NollipfSenseN S A 3 Replies Last reply Reply Quote 0
      • NollipfSenseN
        NollipfSense @BlackBirdWilliams
        last edited by

        @blackbirdwilliams This video will give you some ideas despite its DMZ, in your case you could call it workLAN (just an idea). You find out how to separate your work LAN from home LAN as well as how to communicate to your work LAN from your home LAN and firewall rules.

        https://www.netgate.com/resources/videos-creating-a-dmz-on-pfsense

        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

        B 1 Reply Last reply Reply Quote 0
        • B
          BlackBirdWilliams @NollipfSense
          last edited by

          @nollipfsense I’m embarrassed to admit this wasn’t really helpful, however, I truly appreciate the information. I think I need a more tailored guide to my specific solution. Still haven’t implemented my idea yet.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            You can definitely do that. You just need the correct firewall rules to isolate the subnets and polic based routing to make the connected hosts use the VPN.

            What have you done so far?

            Do you have the OpenVPN client configured?

            Steve

            B 2 Replies Last reply Reply Quote 0
            • S
              SteveITS Galactic Empire @BlackBirdWilliams
              last edited by

              @blackbirdwilliams Each interface is separated by default, and firewall rules control access. You can create one named LAPTOP for instance. Then set up rules like so:

              LAN:
              block from LAN Net to LAPTOP Net
              allow from LAN Net to any [this is there by default]

              LAPTOP:
              block from LAPTOP Net to LAN Net
              block from LAPTOP Net to This Firewall port 443 [don't block DNS]
              allow from LAPTOP Net to any

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote 👍 helpful posts!

              1 Reply Last reply Reply Quote 1
              • B
                BlackBirdWilliams @stephenw10
                last edited by BlackBirdWilliams

                This post is deleted!
                1 Reply Last reply Reply Quote 0
                • B
                  BlackBirdWilliams @stephenw10
                  last edited by

                  @stephenw10I have an IP range of my home LAN as 192.168.1.0/24. I enabled the opt1 phical port and renamed it to worklan and gave it a range of 192.168.55.0/24. Enabled DHCP to give out ip's at a range of 192.168.55.100 - 192.168.55.200.

                  However I think my firewall rules are wonky. I can ping from my laptop on the regular lan to 192.158.55.1.

                  This is a link to the rules https://ibb.co/vjCFZLm

                  I followed a guide and tried to cutomise it however, I do not think this is correct. I would like to isolate my LAN from my worklan and isolate worklan from LAN. Then have that worklan be connected to the express VPN.

                  A 1 Reply Last reply Reply Quote 0
                  • A
                    akuma1x @BlackBirdWilliams
                    last edited by akuma1x

                    @blackbirdwilliams Your rules are setup incorrectly. To setup the isolation of one network from the other, here's what you want to do.

                    Make a new rule on the WORKLAN network, move it all the way up to the top of the list.

                    Action: Reject or Block - either one will work
                    Interface: WORKLAN
                    Address Family: IPv4
                    Protocol: any
                    Source: WORKLAN net
                    Destination: LAN net
                    Description: give it a good name here
                    SAVE

                    And you're done with that one. Make another rule, move it all the way down to the bottom after you are finished making it.

                    Action: Pass
                    Interface: WORKLAN
                    Address Family: IPv4
                    Protocol: any
                    Source: WORKLAN net
                    Destination: any
                    Description: give it a good name here
                    SAVE

                    And you're done with that one. The three rules you've already got in that WORKLAN interface you can disable for now, they are not necessary. You might want to reboot your pfsense box now, just to make sure everything in the firewall rule section sticks and states are reset.

                    To use the ExpressVPN connection on your WORKLAN network, you first have to get that setup as a new gateway on your pfsense box. Do you have that already done? We can work on that in a different response, later.

                    To get your LAN network working, and to block it from accessing the WORKLAN network, you would make the same 2 rules above, on the LAN network, just use LAN net as the source and the WORKLAN net as the destination. Make sense?

                    When you've got these rules created and the 2 network's firewall rules all cleaned up, put up some more screenshots, so we can see if everything is all setup properly. Also, you don't need to use an external site to host your screenshots, you can do that here on the forum. That way, nobody has to click a link and open another site just to see your images.

                    Hope that helps!

                    B 1 Reply Last reply Reply Quote 0
                    • A
                      akuma1x @BlackBirdWilliams
                      last edited by akuma1x

                      @blackbirdwilliams This looks to be a good page for setup instructions for ExpressVPN and pfsense. I don't know for sure, since I don't use that particular service on pfsense.

                      https://techshielder.com/how-to-setup-and-use-expressvpn-on-pfsense

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Surprisingly that guide looks pretty good. Most are bad. 🙄

                        1 Reply Last reply Reply Quote 0
                        • B
                          BlackBirdWilliams @akuma1x
                          last edited by

                          @akuma1x I truly appreciate the help! I have followed your guide to setup the rules on the worklan.

                          However, I'm a little confused as to what I should add on the LAN rules side.
                          Action: Block
                          Interface: LAN
                          Address Family: IPv4
                          Protocol: any
                          Source: LAN net
                          Destination: WorkLAN net
                          Description: give it a good name here
                          SAVE

                          Is the above rule correct? What would be the second rule for the LAN side?

                          B 1 Reply Last reply Reply Quote 0
                          • B
                            BlackBirdWilliams @BlackBirdWilliams
                            last edited by BlackBirdWilliams

                            @blackbirdwilliams Also, I have openvpn setup to allow me to remote into the lan. Will this cause issues with setting up express VPN on the worklan side of things? BTW the Block rule I have added on the lan side, stops the ping from going through from the lan to worklan! Seems like it works after all! This is great.

                            Now I just need a little more guidance as to how to get express on the worklan. I have backup my settings at this point, just in case everything crashes and burns when I try to tweak the guide to fit my setup. Will keep you posted. Any tips would be greatly appreciated. Thank you for the help thus far!

                            B A 2 Replies Last reply Reply Quote 0
                            • B
                              BlackBirdWilliams @BlackBirdWilliams
                              last edited by

                              @blackbirdwilliams Screen Shot 2022-06-16 at 5.15.15 PM.png

                              Would I change number 6. Interface to worklan? I don't want the express VPN to be on the LAN side. Not too sure how to customize this.

                              stephenw10S 1 Reply Last reply Reply Quote 0
                              • A
                                akuma1x @BlackBirdWilliams
                                last edited by akuma1x

                                @blackbirdwilliams Here's what you setup on the LAN network:

                                Make a new rule on the LAN network, move it to the top, right under your anti-lockout rule.

                                Action: Reject or Block - either one will work
                                Interface: LAN
                                Address Family: IPv4
                                Protocol: any
                                Source: LAN net
                                Destination: WORKLAN net
                                Description: give it a good name here
                                SAVE

                                And you're done with that one. Make another rule, move it all the way down to the bottom after you are finished making it.

                                Action: Pass
                                Interface: LAN
                                Address Family: IPv4
                                Protocol: any
                                Source: LAN net
                                Destination: any
                                Description: give it a good name here
                                SAVE

                                That second LAN rule should technically already be there, created automatically when pfsense is first setup. If you look at your LAN rules right away, after a fresh install, it says "Default allow LAN to any rule". It's rule number 2 in this screenshot:

                                pFSense_Firewall_LAN_3.jpg

                                So, long story short, sorry... If you simply create the first rule above (the LAN block rule), and move it into position #2 on your LAN network, you'll be all good to go.

                                Again, put up some screenshots, if you're comfortable with that, so we can check your rule settings.

                                B 1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator @BlackBirdWilliams
                                  last edited by stephenw10

                                  @blackbirdwilliams said in netgate 5100:

                                  Would I change number 6. Interface to worklan?

                                  No. The OpenVPN client has to connect out of the WAN.

                                  As long as you have set 'do not pull routes' as shown in step 40 there nothing should change.

                                  Once you have that up you need to:
                                  Assign the OpenVPN client as an interface. This will give you a gateway to route to.
                                  Make sure the firewall default route is still via the WAN dhcp gateway. In System > Routing > Gateways, make sure the default gateway is set the WAN_DHCP not automatic.
                                  Add policy routing to the pass rule on WORKLAN to make that traffic go via the VPN.

                                  See: https://docs.netgate.com/pfsense/en/latest/vpn/openvpn/assign.html

                                  Steve

                                  B 1 Reply Last reply Reply Quote 0
                                  • B
                                    BlackBirdWilliams @akuma1x
                                    last edited by

                                    @akuma1x I think I'm good to do with the rules. Here is a screenshotfirewallrules.jpg of the LAN side and worklan. worklan.jpg

                                    A 1 Reply Last reply Reply Quote 0
                                    • B
                                      BlackBirdWilliams @stephenw10
                                      last edited by

                                      @stephenw10 I have an OpenVPN rule on my wan side to allow me to remote in. Will this interfere with anything on the express vpn side?

                                      If I follow the guide for express VPN to the T, wont that enable the VPN for all of the LAN? I want to keep the LAN coming out of my regular ISP. However, have the worklan only use the VPN.

                                      Could I get a little more explicit guidance?

                                      I truly appreciate your help!!!

                                      A 1 Reply Last reply Reply Quote 0
                                      • A
                                        akuma1x @BlackBirdWilliams
                                        last edited by

                                        @blackbirdwilliams Yep, that's it, looks good!

                                        So, the ExpressVPN connection you're working on will go in your WORKLAN rule, in the "to outside" rule. When your VPN settings are all done and working, you simply add the VPN connection as your gateway in that rule, like @stephenw10 commented just above.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          akuma1x @BlackBirdWilliams
                                          last edited by

                                          @blackbirdwilliams said in netgate 5100:

                                          Could I get a little more explicit guidance?

                                          Here's a good video that walks you thru using a VPN service as a pfsense client to send a network (or a single machine, or an alias of machines) out a VPN connection.

                                          https://www.youtube.com/watch?v=sGif5rXE3Ps

                                          B 2 Replies Last reply Reply Quote 0
                                          • B
                                            BlackBirdWilliams @akuma1x
                                            last edited by

                                            @akuma1x Great Video! I'm going to give it a shot now. Will keep you posted. Thank you for your time!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.