Bridge setup
-
Which interface should I setup rules on in a bridged setup? If I enable the filtering bridge option, do I need to setup rules on both interfaces?
I guess more generally also, what are the pros and cons of the filtering bridge option?
-
You always filter incoming traffic at an interface, so yes, you want rules on both interfaces depending from where the traffic comes that you want to filter.
-
So say in my DMZ I have a web server. Do I have to duplicate the rules from my WAN interface to OPT1 to allow access to that web server?
-
I hope this clears it up a bit:
Rules on WAN determin what traffic will reach your webserver.
Rules on OPT1 determines where your webserver is allowed to go to.E.g. if you want your webserver to not be able to go anywhere but want clients coming from WAN be able to reach it at port 80 you only need one rule at WAN for this.
-
I hope this clears it up a bit:
Rules on WAN determin what traffic will reach your webserver.
Rules on OPT1 determines where your webserver is allowed to go to.E.g. if you want your webserver to not be able to go anywhere but want clients coming from WAN be able to reach it at port 80 you only need one rule at WAN for this.
Getting clearer I think :)
So if I disable the filtering bridge then hosts on OPT1 are completely unrestricted?
With Cisco I can apply an ACL to an interface explicitely either as an inbound or outbound ACL. Is inbound vs outbound filtering in pf implied by what interface you are connected to?
-
It's just by design that we only filter incoming. There have been lots of discussions about changing that. Search the mailinglists for this discussions. If you are only interested in the result of the discussion: We (pfSense devteam) don't want to change that.