Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Issue with pfsense firewall rule

    Scheduled Pinned Locked Moved Firewalling
    9 Posts 3 Posters 576 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N Offline
      nicber
      last edited by

      Hi,

      I'm having some problems with a rule.

      Here there are my two interfaces ruleset.

      dmz_rules.png

      crosina_rules.png

      But when I try to connect to 192.168.76.220 from 10.90.90.11 on port 1883 the firewall blocks the packets

      firewall_log.png

      I can't figure out where the problem is. I've also tryed with the easypass rule automatically gernerated but I doesn't work either.

      Thank in advance for the help
      Best regards

      kiokomanK 1 Reply Last reply Reply Quote 0
      • kiokomanK Offline
        kiokoman LAYER 8 @nicber
        last edited by

        @nicber
        if 10.90.90.11 is the DMZ network it can't be the source for CROSINA's network
        so the first rule of CROSINA is wrong
        reti_non_sicure can't be the source of CROSINA, this is wrong too
        is 10.90.90.0/24 the network of DMZ ?
        what network do you have on CROSINA? 192.168.76.0/24 ?
        did you post all the rules of DMZ and CROSINA?

        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
        Please do not use chat/PM to ask for help
        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

        N 1 Reply Last reply Reply Quote 0
        • N Offline
          nicber @kiokoman
          last edited by

          @kiokoman

          Thank for the fast reply.
          Yess, these are all the rules on the two interfaces.

          As I understand from your reply rules only matter for outgoing packets, right?
          So, the two top rules in CROSINA are not needed.

          crosina_rules_v1.png

          The two networks are DMZ 10.90.90.0/24 CROSINA 192.168.76.0/24.

          Thanks

          kiokomanK 1 Reply Last reply Reply Quote 0
          • kiokomanK Offline
            kiokoman LAYER 8 @nicber
            last edited by

            @nicber
            yes, indeed, rules only matter for outgoing packets.
            now i'm trying to understand why traffic does not match with your second rule on DMZ ...

            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
            Please do not use chat/PM to ask for help
            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

            N 1 Reply Last reply Reply Quote 0
            • N Offline
              nicber @kiokoman
              last edited by

              @kiokoman

              If it could help this is how the two interfaces are configured. DMZ is a normal VLAN while CRSOINA is a separatd physical network with is own gateway.

              crosina_network.png dmz_network.png

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator @nicber
                last edited by

                @nicber said in Issue with pfsense firewall rule:

                CRSOINA is a separatd physical network with is own gateway.

                So a wan connection then?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                N 1 Reply Last reply Reply Quote 0
                • N Offline
                  nicber @johnpoz
                  last edited by

                  @johnpoz

                  Yess, exactly.

                  kiokomanK johnpozJ 2 Replies Last reply Reply Quote 0
                  • kiokomanK Offline
                    kiokoman LAYER 8 @nicber
                    last edited by

                    @nicber
                    default deny rule IPv4 ... could it be Block private networks and loopback addresses or Block bogon networks ?

                    ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                    Please do not use chat/PM to ask for help
                    we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                    Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator @nicber
                      last edited by johnpoz

                      @nicber well device on your wan to get to stuff behind that network would have to hit the pfsense IP and be forwarded. And would assume other devices on this "wan" of pfsense are not using pfsense as its gateway.. So if you tried to do routing on this networks gateway you run into asymmetrical traffic flow..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.