<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Blocking ALL ssh from WAN]]></title><description><![CDATA[<p dir="auto">How do I block ALL ssh access from the WAN while permitting it from the LAN?</p>
<p dir="auto">I see similar questions to this crop up in the forums pretty regularly, but I haven't yet seen an answer to this one very specific question.</p>
<p dir="auto">I have my WAN rules configured to block private &amp; bogon networks, permit UDP 1194 (OpenVPN), TCP 1723 (PPTP) and GRE (again for PPTP). Other than these I have a rule which says to Block TCP to destination "WAN address". The last rule should be redundant as the implicit "block all" rule should kick in.</p>
<p dir="auto">I thought that the last rule at least would stop ssh polling but I'm still seeing probes in my system logs. sshlockout is running and a secure password has been specified, so the danger is limited, but allowing direct login access to a firewall from its WAN side strikes me as deeply undesirable.</p>
<p dir="auto">Any suggestions?</p>
]]></description><link>https://forum.netgate.com/topic/53302/blocking-all-ssh-from-wan</link><generator>RSS for Node</generator><lastBuildDate>Wed, 11 Mar 2026 21:38:31 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/53302.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 20 Feb 2013 07:23:19 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Blocking ALL ssh from WAN on Wed, 20 Feb 2013 10:14:08 GMT]]></title><description><![CDATA[<p dir="auto">OK, I figured out what's going on here. The problem isn't with pfsense (which is doing the right thing) but with our idiot main firewall, which is passing packets on a particular public network. The pfsense firewall has an address on that network configured on its LAN interface (in preparation for a future life in which it possibly replaces aforesaid idiot).</p>
<p dir="auto">So the packets are coming in on the second firewall, passing through to the public address on the LAN port (where they're being accepted by the anti-lockout rule), then replying. Not a pfsense issue at all.</p>
<p dir="auto">Although the anti-lockout rule is stopping me from blocking that traffic on the LAN port… for now I'll just disable that particular public IP.</p>
<p dir="auto">Thanks for your assistance.</p>
]]></description><link>https://forum.netgate.com/post/380213</link><guid isPermaLink="true">https://forum.netgate.com/post/380213</guid><dc:creator><![CDATA[ronnyc]]></dc:creator><pubDate>Wed, 20 Feb 2013 10:14:08 GMT</pubDate></item><item><title><![CDATA[Reply to Blocking ALL ssh from WAN on Wed, 20 Feb 2013 07:28:57 GMT]]></title><description><![CDATA[<p dir="auto">your rules seems, that you haven't allowed ssh from wan, so it's not open. test your firewall with shields up or similar to prove it yourself.</p>
]]></description><link>https://forum.netgate.com/post/380195</link><guid isPermaLink="true">https://forum.netgate.com/post/380195</guid><dc:creator><![CDATA[Metu69salemi]]></dc:creator><pubDate>Wed, 20 Feb 2013 07:28:57 GMT</pubDate></item></channel></rss>