Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block to or block from?

    Scheduled Pinned Locked Moved Firewalling
    6 Posts 3 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 5
      5mall5nail5
      last edited by

      Hey guys I have 3 networks.  LAN, DMZ, and Isolated.

      I am trying to understand how the rules are processed - do we block to or from interfaces?  Ie., if I am in the DMZ rules, will allowed Source:  LAN to Destination:  DMZ Network override or interfere at all with the LAN rules of Block Source:  LAN to Destination:  DMZ??

      I am just confused on a few things here.

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Please read this:

        https://doc.pfsense.org/index.php/Firewall_Rule_Troubleshooting

        Be sure that the rules are on the proper interface. Imagine sitting inside of the pfSense box. Sure, it's a little crowded in there, but this can help. Imagine packets flying in from the different networks that the pfSense box ties together. The rules will be placed on the interface they entered from. If a packet is going from the LAN to the pfSense box, then out to the Internet, the rules still enter on the LAN. If a packet is coming from the Internet to the pfSense box, the rule goes on the WAN interface.

        And my explanation…

        Firewall rules are processed when a session is started coming INTO an interface.  This means connections from your LAN computers to web pages, DNS servers, mail servers, etc., are handled by rules on your LAN interface.  If you have port forwards permitting connections from the internet inbound to local servers these go on your WAN interface.  This is the single concept that you need to grasp when designing your network.

        The general goal is to block traffic before or pass traffic as it enters the firewall.

        Once the packet is allowed INTO pfSense, it has permission to exit the required interface. (unless you take specific measures to create a floating rule on an interface direction OUT, which is an advanced configuration used to meet specific circumstances)

        And:

        pfSense is stateful

        You do not need to worry about traffic getting back to the host that initiated the connection.  pfSense is a stateful firewall.  It all happens as if by magic.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • 5
          5mall5nail5
          last edited by

          Thanks!

          So, by that, if I want to RDP from "LAN" to "DMZ" I would set an allow on LAN for RDP to DMZ, correct?  So another way to think about it is to modify rules on the interface to keep traffic within or let traffic out, but not to prevent traffic from coming in?

          1 Reply Last reply Reply Quote 0
          • KOMK
            KOM
            last edited by

            So, by that, if I want to RDP from "LAN" to "DMZ" I would set an allow on LAN for RDP to DMZ, correct?

            Yes.

            So another way to think about it is to modify rules on the interface to keep traffic within or let traffic out, but not to prevent traffic from coming in?

            You can't prevent traffic from "coming in" to the interface.  A packet on the wire hits your NIC and sits in the NIC's buffer.  From there, the firewall rules dictate what to do with that packet.  You can control whether or not the interface passes that traffic along to another interface, or if it drops the packet.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              So another way to think about it is to modify rules on the interface to keep traffic within or let traffic out, but not to prevent traffic from coming in?

              This sounds like the exact opposite of how things are.

              You let traffic into your firewall on the interface it arrives on.  From there, it has a free path to its destination unless you specifically block it on an outbound interface with a floating rule (which is rare in a basic config.)  If you want it blocked, block it where it arrives.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                So, by that, if I want to RDP from "LAN" to "DMZ" I would set an allow on LAN for RDP to DMZ, correct?

                Just to clarify, a default install will have an Allow All from LAN to Any rule, so you wouldn't actually need to add a rule to RDP from LAN to DMZ.  Your DMZ, on the other hand, comes with NO rules whatsoever.  You must add a rule to even allow something in the DMZ to initiate a connection to anywhere.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.