Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Blocking access to pfSense Web GUI for a set network

    webGUI
    2
    5
    2.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jungle153
      last edited by

      Hi folks,

      I am quite new to pfSense and I'm slowly getting to grips with it. I would like to block access to the web GUI on one of the networks I have setup and cannot find any clear this is how to block access instructions.

      I have pfSense installed on a protectli vault (4port).
      LAN is my main network and is all hardwired.
      OPT1 - is reserved for future install of NAS / Home Lab
      OPT2 - is set up with an access point and as IOT network.

      I have siloed the IOT network so that it cannot establish connection to the LAN and OPT1 networks.

      To further increase security I have hidden the SSID of the access point. However once logged on to the OPT2 network access to the web GUI is possible via : 192.168.xxx.1.

      I appreciate that in order to gain access to my router someone would need to gain access to the access point or via a compromised IOT device. Then crack the 20 random character password. But I rather not allow anyone to access the router to change settings and gain access to all networks.

      How do I go about restricting access to the router from 192.168.xxx.1 while allowing access from 192.168.yyy.1 and 192.168.zzz.1?

      Any help gratefully accepted.

      Cheers
      Jungle

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @Jungle153
        last edited by johnpoz

        @Jungle153 Put in a rule on this interface before your rules that allow access to the internet, and below the rules that allow access to pfsense that you want on this network..

        So for example..

        rules.jpg

        So as rules are evaluated top down, first rule to trigger wins.. You will see I allow icmp (ping), dns and ntp to pfsense IP address on this network.. The next rule would be any and all other access to any IP on "this firewall".. This would be this interfaces IP, any other IPs on any other interface of pfsense.

        This would prevent say access to your wan IP, most likely public - that that last rule would allow - which is the internet rule that allows any any.. And also this wan IP might change, so using the built in alias of "this firewall" will handle any IP changes or additional interfaces you add with new IPs, etc.

        The next rule that blocks access to an alias rfc1918, is an alias blocks access to any other network I might create - which would be in the rfc1918 space (192.168/16,10/8,172.16/12).. You can use such a rule if you want or not. Now normally using this rule blocking all rfc1918 would work to block access to the gui ports, but your wan IP might be public, and might change - so the "this firewall" rule makes sure no device on this network can access any IP/port on pfsense, other then the ones I explicitly allowed on the rules above.

        You could if you want also just use "this firewall" destination and put in the ports your webgui listen on - 80/443 or whatever you have configured. There are a few ways to skin any cat.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        J 1 Reply Last reply Reply Quote 2
        • J
          Jungle153 @johnpoz
          last edited by

          @johnpoz

          Thanks for the reply.

          It seems that was the ticket. Access to internet works fine and cannot access GUI.

          Capture.PNG

          Cheers
          Jungle

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @Jungle153
            last edited by johnpoz

            @Jungle153 those rules would not allow any access to pfsense IP for dns, ntp - I take it all of these devices are using some external dns and ntp.

            Not a fan of blocking ping either, I want to atleast validate connectivity with a simple ping if need be. But hey you do you..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            J 1 Reply Last reply Reply Quote 1
            • J
              Jungle153 @johnpoz
              last edited by

              @johnpoz

              Thanks again. Just after I read your reply I realised I had killed the internet when little one said she couldn't stream anything on the ROKU.

              I've now added rules for allowing DNS and NTP and also ping.

              Thank you for taking the time to explain, its a steep learning curve. I've gone from using an ISP issue router to this in a week and learning fast how to secure my network.

              Cheers
              Jungle

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.