Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Most effective way to block outgoing traffic

    Scheduled Pinned Locked Moved General pfSense Questions
    4 Posts 4 Posters 809 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      onlineshopper
      last edited by

      Hi guys.

      This may be an amateur question but I'm new to pfSense.  We've heard that pretty much all the smart TVs spy on our viewing habits (even listening in to capture keywords in conversations) for targeted advertising.  Even if you try turning off this option in the TV's menu settings, users have still detect outgoing traffic being shared with a variety of sites.  One way to block this would be to essentially block router traffic to these sites, but since sites can come and go I was thinking instead if its possible for pfSense to entirely block outgoing traffic from a specific MAC address.  If so, would there be a step by step guide available?

      Thank you in advance for any feedback.

      1 Reply Last reply Reply Quote 0
      • H
        heper
        last edited by

        add a static or fixed ip to your TV. block rule source=tv

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          You probably want to pass local traffic then block traffic to any.

          Note that it probably has to make outbound connections to get updated guide info (more for an STB like a TiVo), or get updates, etc.

          You will also need to make outbound connections to stream netflix, amazon, etc.

          The best thing to do is figure out if your TV is spying on you and return it if so.  They will only hear one thing.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • H
            Harvy66
            last edited by

            Just remember, you don't block data leaving an interface, you block data entering an interface. Make sure you block your undesired data from entering the firewall in the first place.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.