Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Where do us complete newbs start?

    Scheduled Pinned Locked Moved General pfSense Questions
    20 Posts 5 Posters 655 Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      SilverFoxFL
      last edited by

      So - my astute son, who's fully aware of my internet paranoia, convinced me I'd feel better if I was using a dedicated firewall rather than simply relying on whatever my very current and expensive router is providing even though said router is "designed and assembled" in the U.S by a U.S. company. He thought a Netgate appliance running pfSense was just what we needed for our large-ish home network.

      So - I bought a 2100 and have it setup with my aforementioned router now operating in AP mode and a couple of POE Ubiquiti UniFi APs serving the fifty or so wi-fi devices in the house.

      Now what?? Evidently, our son is big on advice but thinks his Pop needs to work out the details himself. His paranoia doesn't run nearly as deep as mine, apparently.

      Yes, I need to read the docs and learn all the jargon, but in addition to reading, I need to understand it. Some of that will come with time, although at 70 years old, my retired brain has become just lazy enough that complex new concepts take quite a bit longer than they used to. I mean, merely reading the thread titles here is seriously intimidating.

      In the meantime, I'd really like to feel like my new firewall is working for us even without a full understanding of how to create rules, etc., etc., etc.

      All that said, could/would anyone please impart some basic knowledge from what must be a vast repertoire that exists here and provide a few starting tips for configuring my new firewall so that it's providing at least a little more peace of mind to help alleviate some of my paranoia.

      Thanks so much!

      S 1 Reply Last reply Reply Quote 0
      • S Offline
        SteveITS Rebel Alliance @SilverFoxFL
        last edited by

        @SilverFoxFL
        pfSense like any rational firewall will block incoming connections.

        What are your goals? Right now it seems more like you have a solution but are missing problems. :) I suggest making a list.

        Netgate has videos: https://www.youtube.com/c/netgateofficial
        As do others.

        And really good docs: https://docs.netgate.com/pfsense/en/latest/index.html
        https://docs.netgate.com/pfsense/en/latest/recipes/index.html

        Posts in any forum are often about problems people can’t solve on their own but one can pick up lots of info over time.

        Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
        Upvote 👍 helpful posts!

        S 1 Reply Last reply Reply Quote 1
        • S Offline
          SilverFoxFL @SteveITS
          last edited by

          @SteveITS

          Thanks for the quick reply, Steve. You make really good points.

          Case in point, I don't really know what my goals are at the moment, other than me being able to worry less about some hacker getting into our network and wreaking havoc. I don't even know for certain that it's much of a possibility as long as our OSes (Windows 11 and MacOS) are up-to-date. Hence, your remark eluding to me having a solution to an unknown problem is spot on.

          I suppose, maybe, I'm trying to determine if there are one or many "standard", "typical", "ubiquitous", or otherwise, firewall rules that I should add to the 2100 to keep our network as safe as reasonably possible. Your comment about "any rational firewall" makes me think that it's already configured, for the most part, to provide all the protection we need(ed) - until it doesn't. In other words, maybe I don't need to worry about fiddling with configurations until/unless some sort of issue crops up as a result of an outside intrusion, at which time I may have a specific question for a specific problem. Please school me if that's not close to being correct.

          Curious, though, would you say that adding the 2100 to our network in a strictly default configuration in any way diminishes our network protection from what our router provided? I wouldn't have considered that to be possible but, obviously, I'm more than just a little confused about the subject matter.

          In any case, thanks for the links to the info to which I should be paying attention.

          S 1 Reply Last reply Reply Quote 0
          • S Offline
            SteveITS Rebel Alliance @SilverFoxFL
            last edited by

            @SilverFoxFL out of the box pfSense allows all outgoing traffic. Some people may choose to limit by country, or say forward DNS to a Quad9 or CloudFlare Family to block adult sites.

            It’s not going to make your network less secure, no.

            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
            Upvote 👍 helpful posts!

            S 1 Reply Last reply Reply Quote 0
            • S Offline
              SilverFoxFL @SteveITS
              last edited by

              @SteveITS Thanks again, Steve. I'm encouraged that the new appliance will be beneficial especially when it comes to the dozens of IoT devices we have all over the house these days. I shudder to think about how UN-secure 99% of those things are.

              J 1 Reply Last reply Reply Quote 0
              • J Offline
                Jarhead @SilverFoxFL
                last edited by

                @SilverFoxFL A lot of people will add vlans to their networks just to isolate all those IoT devices. Because, as you said, they are unsecure for the most part.
                Putting them on their own subnet keeps them away from your 'more secure' devices but still lets you access them as needed.

                S 1 Reply Last reply Reply Quote 0
                • LarryFahnoeL Offline
                  LarryFahnoe
                  last edited by

                  @SilverFoxFL along the lines of defining your goals, establishing a philosophy is also helpful. For example one firewall philosophy is "that which is is not explicitly permitted, is prohibited" which is implemented as a set of rules allowing specific traffic and a default rule blocking everything else. These rules are added to your LAN interface. The downside is that you are now asserting your control which may end up driving your family nuts if/when you inadvertently block something that they were using (intentionally or otherwise).

                  Another perspective is that the addition of a firewall is building a defense in depth strategy. While it is important to keep software up to date, from a security perspective, it makes some sense to have a degree of mistrust between the firewall and the various systems being protected. In other words the firewall shouldn't assume that the clients are all patched and protected, while the clients shouldn't assume that the firewall makes them entirely safe. This is particularly relevant with a bunch of IoT clients.

                  I think as you get started down this route it makes sense to look at the Netgate as a filtering and control device, mainly for the traffic leaving the house. The two primary areas of control are firewall rules (assuming the default block scenario above) and DNS filtering.

                  Good luck, it is an interesting journey!

                  --Larry

                  S 1 Reply Last reply Reply Quote 1
                  • S Offline
                    SilverFoxFL @Jarhead
                    last edited by

                    @Jarhead Great idea! Now I have two new major networking skills I need to master. Better get started. 😬

                    1 Reply Last reply Reply Quote 0
                    • S Offline
                      SilverFoxFL @LarryFahnoe
                      last edited by

                      @LarryFahnoe Thanks for that perspective. I'm beginning to think I've opened a big can of worms for myself, but I fully agree, particularly in this age of massive hacking, it's better to assume devices are under-protected and do what we can to make them less vulnerable. I also believe I'd never find the time to adequately administer the first type of philosophy you mentioned. I'd be the one going nuts. Somewhere along the line I'm hoping to find that happy medium of balancing too much against too little.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S Offline
                        stephenw10 Netgate Administrator
                        last edited by

                        I agree one of the most important things you can do to improve security is segregate devices onto a separate internal subnet to allow filtering between them.

                        But, like most things in computing, it comes down to security vs convenience. You make it more secure some things are probably going to become less convenient! 😉

                        S 1 Reply Last reply Reply Quote 0
                        • S Offline
                          SilverFoxFL @stephenw10
                          last edited by

                          @stephenw10 Yep, that seems to be the consensus.

                          Funny that I'm writing this on my Windows 11 laptop. A few minutes ago I happened to be doing a quick email check on my iPad Pro. When I saw the Forum email about your post, I touched the "View Post" button. Safari opened the link and showed me this: [[error:blacklisted-ip]]

                          I feel certain this must have something to do with my new firewall. Sad thing is I have no idea how to even approach fixing it for the iPad. Why blacklist its IP if my laptop's IP presents no problem? Is it a DNS issue in reality? Seems unlikely since my laptop browser should be resolving "forum.netgate.com" to the same address? Questions abound!

                          Still not understanding much about the 2100, I'm guessing there must be some way for me to add/approve the iPad's IP to avoid such an error. But then what happens when my iPad connects with a different IP at a later time? I haven't, and don't want to, reserve IP addresses for every internet connected device in the house.

                          As I mentioned earlier to @LarryFahnoe, it's becoming the can of worms problem, I'm afraid, and I know just enough about networking to be dangerous. This is all going to be a very long work-in-progress me thinks.

                          S 1 Reply Last reply Reply Quote 0
                          • S Offline
                            SteveITS Rebel Alliance @SilverFoxFL
                            last edited by

                            @SilverFoxFL pfSense doesn’t have that message, it’d be server side error I expect.

                            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                            Upvote 👍 helpful posts!

                            S 1 Reply Last reply Reply Quote 0
                            • S Offline
                              SilverFoxFL @SteveITS
                              last edited by

                              @SteveITS Very interesting! Of course, the server is "forum.netgate.com" Full URL is "forum.netgate.com/topic/199561/where-do-us-complete-newbs-start/12".

                              Why would the server return that error ONLY on every iPad browser? Every Windows browser I've tried resolves without error. Obviously, something is very, very different between Windows and iPadOS networking. But how do normal people determine what those differences might be? And how do I begin to learn where in the 2100 I would find settings to fix anything like this?

                              This is exactly the kind of stuff that I'm afraid I'll be spending endless hours trying to understand and to no avail. Sorry for the pessimism. I'm feeling like the "hot mess" my kids sometimes accuse me of being.

                              S 1 Reply Last reply Reply Quote 0
                              • S Offline
                                SteveITS Rebel Alliance @SilverFoxFL
                                last edited by

                                @SilverFoxFL Are you by chance using Apple's proxy service? I forget what it's called but it's via a paid subscription to their online services.

                                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                                Upvote 👍 helpful posts!

                                S 1 Reply Last reply Reply Quote 0
                                • S Offline
                                  SilverFoxFL @SteveITS
                                  last edited by

                                  @SteveITS OH. MY. GOSH! I just figured it out and I’m really embarrassed.

                                  I have Proton VPN installed on my iPad, but I only activate when I’m feeling especially paranoid which actually isn’t all that often. Much to my surprise, the “Connect on demand” option had gotten turned on, probably with a recent app update. So, despite me toggling the VPN off, it turned itself back on, and I hadn’t noticed it. Still …

                                  I’m not sure when it might have occurred to me to look for that, but I opened the netgate.com site and started clicking around to see if the error popped up anywhere except the Forum. It didn’t. That got me seriously wondering what was up with that. Then I remembered, that for one of those completely unknown reasons, every VPN I’ve ever had on the iPad had similar problems with certain sites in much the same way. I opened the Settings app, turned off the Connect On Demand VPN setting and, voila, here I am using the iPad to post this message.

                                  My sincere apologies for sending anyone on a wild goose chase. That’s one setting I will never forget to check at the first sign of any similar problem.

                                  Finally, thanks to all who have taken an interest in my questions and troubles. I truly appreciate the assistance while ignoring my ineptness in the process. Cheers!

                                  S 1 Reply Last reply Reply Quote 1
                                  • S Offline
                                    SteveITS Rebel Alliance @SilverFoxFL
                                    last edited by

                                    @SilverFoxFL Generally blocks like that are because some people are using those VPNs for malicious reasons, causing the shared IPs to be blocked. Or I’ve seen sites block VPNs for licensing reasons…they can only show content in certain countries.

                                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                                    Upvote 👍 helpful posts!

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S Offline
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Yup, that's coming from the forum server because that particular ProtonVPN address is on a blacklist.

                                      S 1 Reply Last reply Reply Quote 0
                                      • S Offline
                                        SilverFoxFL @stephenw10
                                        last edited by

                                        @stephenw10 Well, OK, I have to let my curiosity get the best of me: why would this forum's address be on a ProtonVPN blacklist. I'm having a hard time believing it's a security risk. Is there something a whole lot of people here know that I don't? 🤔

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S Offline
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          It's not it's ProtonsVPNs public IP that's on our blacklist. Almost certainly because at some point some bad actor was using ProtonVPN and got the address flagged.

                                          S 1 Reply Last reply Reply Quote 0
                                          • S Offline
                                            SilverFoxFL @stephenw10
                                            last edited by

                                            @stephenw10 Ohhh! Another of my misunderstandings. Now I get it. Thanks for humoring me and my curiosity. 😳

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.