Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Disabling pfSense web ui on WAN (entered from LAN) and other VLANS

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 6 Posters 4.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mysongranhills
      last edited by

      So a while back I saw a video on DNS rebinding attacks and the guy in the video tried to boil it down to: if you can reach the web gui from your LAN by typing in your WAN address (instead of the gateway IP) , than you are vulnerable. This currently works for me (I can reach the web ui login from a desktop on the LAN using my public ip).

      So my questions are:

      1.)Am I vulnerable truly, and if so how to I prevent it?

      2.)How do I block access to the web ui from other vlans? I'd like it to only be accessible from the management vlan, and not getneral lan or my wireless vlan. Currently I can pull up the login from all vlans  by typing each vlans gateway ip in.

      Thanks for any help!

      1 Reply Last reply Reply Quote 0
      • E
        EMWEE
        last edited by

        Why would a open up your WAN ports….DONT.

        Block it with destination: this firewall.

        And another suggestion is do disable redirect and run the webgui on different port.

        1 Reply Last reply Reply Quote 0
        • M
          mysongranhills
          last edited by

          The only ports open on my WAN are for services I'm using (SSH/FTP/HTTP/Torrents, etc).

          I'm thinking you didn't quite understand what i was trying to say.

          If I browse to http://My-Public-IP from outside my home I do not get access to pfSense web ui. It only happens when browsing to public ip from with in the LAN.

          1 Reply Last reply Reply Quote 0
          • H
            hda
            last edited by

            You could use an explicit rule allowing:

            IPv4 TCP from LAN net * to LAN address ports 80, 443

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              So block those vlans from accessing firewall IPs on the management ports, 22, 80, 443, etc.

              What do the rules look like on your vlans you don't want to access your web gui from?

              So for example my guest wlan is locked down to only be able to ping the firewall on the interface in that vlan.  And it can not access any other vlans either with the allow that says ! (not) my other local networks. in that alias.

              blockaccessfirewallip.png
              blockaccessfirewallip.png_thumb

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                As already noted above, you should block access to "This Firewall" management ports.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Pass traffic on This firewall (self) that you want people to be able to access (like DNS) then reject any to This firewall (self).

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • E
                    EMWEE
                    last edited by

                    @mysongranhills:

                    The only ports open on my WAN are for services I'm using (SSH/FTP/HTTP/Torrents, etc).

                    I'm thinking you didn't quite understand what i was trying to say.

                    No i do understand….you dont understand.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mysongranhills
                      last edited by

                      Maybe I'm truly misunderstanding something obvious and if so I apologize profusely. But all the methods above seem to me to address blocking access to the web-ui in-of-itself, which is perfect for restricting certain VLANS. But on some VLANS I ONLY want to block access to the web-UI from the LAN when http://75.76.xxx.xxx is entered. If http://192.168.1.1 (or w/e internal IP) is entered I WANT to be able to access the web-ui.

                      Here is the link to the videohttps://www.youtube.com/watch?v=0duYxPIx8gU describing dns rebinding attacks and that a router is vulnerable (at least according to the video) if the web-ui can be accessed by typing public ip into browser from LAN.

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        But on some VLANS I ONLY want to block access to the web-UI from the LAN when http://75.76.xxx.xxx is entered. If http://192.168.1.1 (or w/e internal IP) is entered I WANT to be able to access the web-ui.

                        So on those VLANs block just that destination instead of This firewall.

                        I, personally, don't see why it would matter - the webgui is the webgui - but knock yourself out.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          You do understand unless you have opened up the wan rules that the webgui is not available from the actual wan.  If your going to allow vlan X to access it via the vlan X ip address of pfsense - WTF does it matter if they can also access it via the wan IP from the lan side??

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 1
                          • M
                            mysongranhills
                            last edited by

                            Honestly I don't know why there would be a difference either but im not a security researcher presenting at blackhat and the claim he made was that if the WAN IP can be used to access the web-ui from lan that  you are vulnerable to DNS rebinding attacks. I was taking him at his word. Do you think this information is wrong?

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.