Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PLEASE stop enforcing firewall rules on pfsense!!! Let us manage our own firewall rules!!!

    Scheduled Pinned Locked Moved webGUI
    27 Posts 7 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @denitrosubmena
      last edited by johnpoz

      @denitrosubmena well since your error is just timeout with your ping from your client.. that points to it seeing a mac for that IP.. Is it the right one? can't tell without viewing your arp table.

      so if a client doesn't know the mac address of an ip your trying to ping you would normally see an error like so

      linux

      user@UC:~$ ping 192.168.2.66
      PING 192.168.2.66 (192.168.2.66) 56(84) bytes of data.
      From 192.168.2.13 icmp_seq=1 Destination Host Unreachable
      From 192.168.2.13 icmp_seq=5 Destination Host Unreachable
      From 192.168.2.13 icmp_seq=8 Destination Host Unreachable
      

      windows

      $ ping 192.168.9.44
      
      Pinging 192.168.9.44 with 32 bytes of data:
      Reply from 192.168.9.100: Destination host unreachable.
      Reply from 192.168.9.100: Destination host unreachable.
      
      Ping statistics for 192.168.9.44:
          Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
      

      As to what is going on with your setup I not sure.. Is this real hardware, all on a vm - some hardware and vm?

      When you ping from the client to pfsense lan IP while sniffing on pfsense lan interface - do you see those pings?

      When you were messing around with rules - did you happen to put some rule in the floating tab that could be blocking. But that wouldn't stop dhcp since when you enable dhcp, pfsense puts in hidden rules above where floating rules that allows for dhcp..

      Your wan IP (via dhcp?) not overlapping with the /16 you put on the lan is it?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      D 1 Reply Last reply Reply Quote 0
      • D
        denitrosubmena @johnpoz
        last edited by

        @johnpoz

        here is packet capture when i ran ping from the VM to pfsense LAN gateway

        8a82328c-5ee3-41ca-956b-4e9da8491142-image.png

        4281b33c-8a13-418e-84e2-b183a3617f52-image.png

        pfsense is VM in proxmox and then VM 10.100.0.1 will use pfsense as router

        1 Reply Last reply Reply Quote 0
        • D
          denitrosubmena
          last edited by denitrosubmena

          @johnpoz

          I fixed the issue!!!
          stupid me, so i turned on firewall on the pfsense VM in proxmox which was blocking everything

          I turned off the firewall and now am good, VM is working fine and can reach internet

          fb42268d-c2e3-4311-93fb-95ff20841002-image.png

          what a day

          thanks for all your help

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @denitrosubmena
            last edited by

            @denitrosubmena I was going to say you see the arp and the reply.. so that screams firewall between somewhere, be it on the client or something between. If was a firewall issue on pfsense, you would of still seen the pings - just they would not of been allowed up the stack to be answered.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            S 1 Reply Last reply Reply Quote 0
            • S
              SteveITS Galactic Empire @johnpoz
              last edited by

              @johnpoz New “laissez-faire” firewall technology…eh, it’s probably OK, sure, go ahead.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote 👍 helpful posts!

              M 1 Reply Last reply Reply Quote 2
              • M
                michmoor LAYER 8 Rebel Alliance @SteveITS
                last edited by

                @SteveITS the best kind of firewall policy 🙏

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 1
                • B
                  binfree @denitrosubmena
                  last edited by binfree

                  @denitrosubmena said in PLEASE stop enforcing firewall rules on pfsense!!! Let us manage our own firewall rules!!!:

                  My use-case i have pfsense installed at the edge and i need to access it via the WAN address that is public, like every other hardware router in the damn world that is the one that connects directly to internet

                  To be fair, there's no router anywhere, sold commercially, that's set up to allow access from the public WAN to its webGUI. At least not any that didn't ship without being misconfigured by accident at the factory. Are you suggesting you wanted pf to forward 80 and 443 by default? This is all rhetorical anyway, as pf definitely allows a local connection to the WAN port during setup, which makes things much easier. When LAN has been set up, it's obviously not needed anymore.

                  @denitrosubmena said in PLEASE stop enforcing firewall rules on pfsense!!! Let us manage our own firewall rules!!!:

                  proxmox which was blocking everything

                  I'm new here, but even I think it would have been a great idea to mention right away that pfSense was being virtualized. And on top of that, behind some POS like Proxmox.

                  1 Reply Last reply Reply Quote 1
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.