Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to get internet access from ISP modem

    Scheduled Pinned Locked Moved Routing and Multi WAN
    9 Posts 2 Posters 955 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      ama
      last edited by ama

      Hello,
      I am new to Pfsense and need to know how to configure the Wan port on the router in order to communicate with the Comcast modem and provide internet access to the devices behind the firewall?
      My current set up is as follows:
      Lan port is on the 192.168.1.x and that is working great. PfSense DHCP and DNS resolver are enabled
      Wan port was initially set up to default DHCP

      When that did not work on the Wan side, I changed the Wan configuration to a static public ip provided by the ISP. The IP has a totally different subnet.
      DHCP, DNS and NAT are disabled on the Comcast modem.
      The only interface I can access via web browser is the PfSense interface.
      What do I need to do to get devices behind the pfsense internet access? My site is totally down now.
      Thank you.

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @ama
        last edited by johnpoz

        @ama if its just a modem and not a gateway then you need to reboot it when you change out your old router with the new router. And it would be dhcp. Every single cable modem I have ever seen requires a power cycle when you change the device connected to it. Unless your doing a mac address clone on the new device your connecting to it.

        If its a gateway, ie modem/router combo you would need to make sure its not the same network as your lan. For example if you have 192.168.1.x on both your wan and and your lan on pfsense - its not going to work too good ;)

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        A 1 Reply Last reply Reply Quote 0
        • A
          ama @johnpoz
          last edited by

          @johnpoz Good morning,
          Thank you for replying. Yes I understand that part. I connected a laptop directly to the comcast modem and used one of their provided static addresses. I was able to ping the gateway and get out to the internet. that ruled out issues with the ISP modem. I had the wan port and gateway set to the static Ips provided by comcast and that still did not allow the devices behind the firewall to reach the internet. Is there a default firewall rule that is preventing Lan devices from access to the internet through the firewall? If yes, does it not need to be removed or edited?

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @ama
            last edited by johnpoz

            @ama no out of the box pfsense lan rule is any any.. And would nat any traffic coming from your lan to whatever pfsense wan IP is..

            So unless you modified this rule, or not using the default lan - new interfaces you create would have no rules on them.. Or messed with the automatic outbound nat. Pfsense should just work out of the box, as long as pfsense gets/has a valid IP on its wan that can talk to the internet, and doesn't overlap with the network you have on your lan interface of pfsense.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            A 1 Reply Last reply Reply Quote 0
            • A
              ama @johnpoz
              last edited by

              @johnpoz
              Nope! did not mess with any rules. All is at default.
              Wan is set to Static provided by ISP
              Lan is set to private IP
              I was unable to ping the gateway or any other site using the ping option. I browsed how to use PfSense ping and the first link pointed out needing to allow Ping on the firewall.
              Added Firewall rule to allow ICMP ping on the PfSense router and that was the way out to the internet. I am back in Business. Is there a security concern with such a rule?
              RFC 1918 is blocked and BOGON as well on the WAN rules.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @ama
                last edited by johnpoz

                @ama said in Unable to get internet access from ISP modem:

                first link pointed out needing to allow Ping on the firewall.

                Out of the box pfsense would be able to ping anything outbound, there is no rule needed.. Now if your isp required the device to answer a ping coming into its wan before it would allow you to access the internet.. Then yes you would have to allow ping to the wan.. But this seems like an odd requirement..

                Maybe your isp does not allow static IPs unless they answer ping?

                Out of the box any traffic sourced from pfsense itself is allowed. Out of the box anything on the lan network is allowed.. You should for example be able to ping 8.8.8.8 out of the box with no rules needed to be added or allowed.

                What specific rule did you create or edit?

                As to allowing ping into your wan... I allow it.. Because I like monitoring I run from the public internet to check to see if it can get to my IP.. And if not alert me that my internet connection is down.

                If your concerned with allowing ping into your wan - then limit it to the source IP or IPs that would be pinging you from your isp..

                Here is my ping rule on wan

                allowping.jpg

                I limit it to specific IPs, US IPs are allowed, some lists of where other pings I want to allow might come from - status cake, uptime robot, etc. And its limited to only echo req, and not all icmp..

                I use pfblocker to create the alias of geo Ips, and other lists that I allow.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                A 1 Reply Last reply Reply Quote 0
                • A
                  ama @johnpoz
                  last edited by

                  @johnpoz
                  That would be my assumption too. This is an inherited situation and i am only discussing the tail end of it here. It was an out of the box router, installed Pfsense on then add tailscale for VPN access.
                  no rules modified at that time. when it was put on the network nothing would let up out until I added the ICMP rule to the firewall. The current rule is for IPV4 family, protocol ICMP (Echo Request), Source= any, destination= this firewall,

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @ama
                    last edited by johnpoz

                    @ama this firewall prob isn't a very explicit choice.. Wan address would be normally what you would use on your "wan" the "this firewall" is ALL ips on the firewall.. That is something you would normally use on a lan side interface where you want to block access to any pfsense IP after you have allowed what you want, normally before your any any rule on the bottom that allows internet.. This keeps say users on some network from accessing your web gui via the pfsense wan IP, etc.

                    As you move forward and tweaking your rules for your specific needs and wants. You might want to lock down the icmp rules to more limited space other than the "planet" ;) While sure you might want your isp to ping you.. Do you really want/need some IP in RU or China pinging your wan? I mean prob not a big security issue - but as you start to lock down stuff, why allow something you would never need..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    A 1 Reply Last reply Reply Quote 0
                    • A
                      ama @johnpoz
                      last edited by

                      @johnpoz
                      agreed!
                      The problem right now is losing the internet access if i disable this rule on the Wan. I am ways away from getting to know how the rule apply on PfSense. Just getting back online is the first step right now. Thank you for your support John!
                      I will let you know once I have a better grip on the rules.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.