Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ping from IOT still works?

    Scheduled Pinned Locked Moved Firewalling
    7 Posts 3 Posters 589 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F Offline
      Freek_Box
      last edited by

      Hi Gurus, I implemented the rules from a topic that I found on the forum done by @johnpoz

      If I use the ping from diagnostic and do ping to a computer that is in the rfc1918 alias rule with source address the IOT vlan the packages are received. But I would asume that the packages would be lost. Even when I Disable the first rule that allows ping between test net and test address there still received. Am I doing something wrong?

      f9adcfcf-e136-44bd-8c7a-ca5563a383bc-image.png

      NogBadTheBadN johnpozJ 2 Replies Last reply Reply Quote 0
      • NogBadTheBadN Offline
        NogBadTheBad @Freek_Box
        last edited by

        @freek_box Kill the firewall states and try again.

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        F 1 Reply Last reply Reply Quote 0
        • F Offline
          Freek_Box @NogBadTheBad
          last edited by

          @nogbadthebad What do you mean, sorry I'm a noob.

          NogBadTheBadN 1 Reply Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator @Freek_Box
            last edited by

            @freek_box said in Ping from IOT still works?:

            If I use the ping from diagnostic

            Why would you thinking pinging from pfsense would be blocked?

            To test a firewall rule on network X, you would need to be testing from network X. Not the diagnostic tool in pfsense.

            There are hidden rules that allow pfsense to go anywhere.

            # let out anything from the firewall host itself and decrypted IPsec traffic
            pass out  inet all keep state allow-opts ridentifier 1000013065 label "let out anything IPv4 from firewall host itself"
            pass out  inet6 all keep state allow-opts ridentifier 1000013066 label "let out anything IPv6 from firewall host itself"
            

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

            F 1 Reply Last reply Reply Quote 0
            • F Offline
              Freek_Box @johnpoz
              last edited by

              @johnpoz hi John thank you so much for replying. On this moment I have no computer in the network that I can use to do a ping from it to a different computer so thats why I assumed I could do that from Pfsense. Just wanted to make sure I implemented your rules correctly :)

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator @Freek_Box
                last edited by

                @freek_box well your going to need to put something on the network your wanting to lock down to test. Interface rules are not evaluated when you test from pfsense itself.

                To block pfsense from going somewhere you would have to use a floating rule and in the outbound direction.

                So for example if I wanted to stop pfsense from pinging say 192.168.9.100 in my lan.

                block.jpg

                Notice how its logged, and also after I tried you see that rule shows that it has been evaluated, the 0/0 is no longer 0/0

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                1 Reply Last reply Reply Quote 0
                • NogBadTheBadN Offline
                  NogBadTheBad @Freek_Box
                  last edited by

                  @freek_box

                  Screenshot 2022-10-30 at 09.57.42.png

                  Andy

                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.