• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

pfBlockerNG and floating rules: To float or not to float?

Scheduled Pinned Locked Moved pfBlockerNG
3 Posts 3 Posters 772 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    MarinSNB
    last edited by Aug 27, 2023, 2:27 PM

    Hi everyone.

    I posted this on Lawrence Systems forums too and doing the same here to reach out to a wider audience.

    I have reviewed several pfBlocker-NG setups on YouTube and other sites, including Tom’s videos, and wanted to get your thoughts, suggestions and recommendations on whether you prefer setting up floating rules up with this pfSense package or not.

    Thanks in advance!

    Netgate 6100 Max pfSense+
    —>Unifi Aggregation/24 Pro PoE/24 PoE Enterprise switches
    —> UCK2+
    —> 3x U6E APs

    K 1 Reply Last reply Aug 27, 2023, 2:52 PM Reply Quote 0
    • K
      keyser Rebel Alliance @MarinSNB
      last edited by Aug 27, 2023, 2:52 PM

      @MarinSNB said in pfBlockerNG and floating rules: To float or not to float?:

      Hi everyone.

      I posted this on Lawrence Systems forums too and doing the same here to reach out to a wider audience.

      I have reviewed several pfBlocker-NG setups on YouTube and other sites, including Tom’s videos, and wanted to get your thoughts, suggestions and recommendations on whether you prefer setting up floating rules up with this pfSense package or not.

      Thanks in advance!

      I generally stay away from floating rules in almost all cases. I much prefer to be able to see to current rules hierachy on each interface. So I create (and clone) my pfBlockerNG rules to all interfaces - takes a while, but is very much easier to interpret afterwards.
      The only exception is that I do use floating rules for access to the pfBlockerNG/Unbound sink webserver’s VIP address

      Love the no fuss of using the official appliances :-)

      1 Reply Last reply Reply Quote 2
      • D
        darcey
        last edited by darcey Aug 31, 2023, 8:28 AM Aug 31, 2023, 8:16 AM

        I have some pfBlocker generated rules as floating/quick. Some of which protect a few forwarded ports on the WAN interface.
        I have logging turned on for these rules and, whilst it works as expected. one thing puzzles me: The logged DST IP is sometimes the WAN interface and sometimes the internal forwarded-to IP. I don't understand why this variation occurs. Is it a consequence of 'floating' rules? Whilst the rules concerned are 'floating', they're assigned only to the WAN interface. It seems as if the rule can be evaluated before or after NAT occurs?

        1 Reply Last reply Reply Quote 0
        3 out of 3
        • First post
          3/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received