Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PassList understanding

    Scheduled Pinned Locked Moved IDS/IPS
    2 Posts 1 Posters 311 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by michmoor

      Hello everyone,
      I want to make sure my understanding of how i want my passlist to be implemented is correct.
      I have quite a few directly connected networks. There are2x networks (admin networks) that i want exempt from being blocked.
      192.168.50.0/24 and 172.17.0.0/24.

      I created an Alias defining these, created a custom passlist and assigned to an interface.
      My intent is that any traffic passing between directly connected networks not mentioned in the alias can be blocked as opposed to the default passlist which wouldnt block any networks on the firewall.
      So traffic passing between my DMZ and Server networks will be scanned and if a signature is matched, will block those hosts.
      Traffic passing between my DMZ and admin networks will be scanned but no blocking action is done. I think an alert is still triggered tho? Please correct me if im wrong.

      edit: I have set my PassList to 'none' on my server vlan. I ran the following command to an apache server running on my LAN

      curl -A "BlackSun" wpad.example.com
      

      That alert always triggers. It did not in this case. When i ran the same command but to google.com i get a block on the IPs.
      Any ideas as to why the blocks arent working on traffic flows between my directly connected networks?

      Passlist is assigned to Interface
      46186b67-da65-4287-a37f-c7d92d822a3a-image.png

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @michmoor
        last edited by

        I got it all sorted out. Had to restart the interface three times but no inter-vlan traffic will be blocked. I tested this running a nmap scan between networks not in the PassList.

        Setting to 'none' is the best option per the maintainer's notes but i just need a bit of flexibility.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.