Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow all between interfaces

    Scheduled Pinned Locked Moved Firewalling
    28 Posts 6 Posters 9.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      You need ping if you need ping. You don't if you don't.

      I, personally, pass ping to the users' default gateway and DNS servers as a matter of courtesy in case someone clueful is trying to debug something.

      I don't know why you don't pass what you want them to access then reject any to This firewall. Then reject any to RFC1918. Then pass any.

      The only time what won't work is if you have subnets on public addresses then you'll need another alias for those.

      I would love to see a Local subnets automatic alias like This firewall.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        With Derelict here, this is right on target

        Pass the local assets guest hosts need (DNS, etc)
        Reject the local assets you don't want them to access (RFC1918, other VLANs, This firewall)
        Pass everything else (The internet)

        There is never going to be a perfect setup that you can just clone because every setup is different..  If you don't understand the concepts even at a basic level and are just wanting to copy a config your in trouble.  Maybe you should just stick with a off the shelf device that doesn't really even allow you control..

        Out of the box pfsense does not provide authoritative name server, like bind can be authoritative..  dnsmasq (forwarder) and unbound (resolver) are not really meant to be authoritative for any domain.  If what you want is an authoritative name server, then install the bind package in pfsense.  Bind can then either forward or resolve.  You don't seem to understand the difference between a forwarder and a resolver??  If that is the case your most likely going to be happy with just the forwarder.  Your clients ask pfsense for www.google.com, it forwards that to the name servers you put in the general tab.  Simple…

        edit: forwarder not resolver, edited..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • F
          FlashEngineer
          last edited by

          @johnpoz:

          With Derelict here, this is right on target

          Pass the local assets guest hosts need (DNS, etc)
          Reject the local assets you don't want them to access (RFC1918, other VLANs, This firewall)
          Pass everything else (The internet)

          There is never going to be a perfect setup that you can just clone because every setup is different..  If you don't understand the concepts even at a basic level and are just wanting to copy a config your in trouble.  Maybe you should just stick with a off the shelf device that doesn't really even allow you control..

          Out of the box pfsense does not provide authoritative name server, like bind can be authoritative..  dnsmasq (forwarder) and unbound (resolver) are not really meant to be authoritative for any domain.  If what you want is an authoritative name server, then install the bind package in pfsense.  Bind can then either forward or resolve.  You don't seem to understand the difference between a forwarder and a resolver??  If that is the case your most likely going to be happy with just the resolver.  Your clients ask pfsense for www.google.com, it forwards that to the name servers you put in the general tab.  Simple…

          It's a given there's never a perfect setup but I prefer starting from an example which most people use and work off from there.  Doing from scratch I may miss a rule that should be in place.  I understand the rules but just don't know which to apply want to make sure the order is correct.

          Example I'm used to in ZS would be, everything is blocking between vlan but then I allow a rule for a single host or range to access another vlan's full subnet or just another single host.  There isn't any need for "allow" **** in ZS so that's a new concept to me.  Also in ZS, I don't need to allow DNS (53) in order to resolve internet addresses, since the way ZS works is with iptables, using the forwarding chain as the main filter between interfaces/vlans.  Totally different concept, hence why I just wanted a example of rules most people use then I work off from there obviously.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            so my example given would be a start, just leave out the ipad rule I have in place to allow my ipad to go where ever it wants.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • F
              FlashEngineer
              last edited by

              @johnpoz:

              so my example given would be a start, just leave out the ipad rule I have in place to allow my ipad to go where ever it wants.

              Sounds good, so basically

              client specific rules to allow
              allow DNS
              block webui
              !RFC1918 disallows to any other local network but passes all other traffic to WAN

              In terms of blocking, is the last 2 sufficient on a guest only vlan?

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                depends!  Are there some vlans you want the guest to talk to?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • F
                  FlashEngineer
                  last edited by

                  @johnpoz:

                  depends!  Are there some vlans you want the guest to talk to?

                  Not for true guest, I want it basically strictly internet/wan only.  There are some vlans I would permit some limited access to certain hosts on another vlan but that's easily done with the specific allow rules placed at the top of the list correct?

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    Don't get wrapped around the axle about blocking the webgui. Block everything to destination This firewall after passing what they need to have access to like DNS.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.