Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing Rules and creating a static RDP Route

    Scheduled Pinned Locked Moved Routing and Multi WAN
    3 Posts 1 Posters 819 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      mattig89ch
      last edited by

      Hidy ho everyone,

      I'm trying to do some more messing around with Pf sense today, and I have some questions for you all.

      I have a network consisting of 3 running virtual machines, all run through virtual box.  I have a pfsense router with 3 network interfaces.  The WAN interface is facing my local lan through a bridged interface.  Next, my second interface is facing a nic in a virtual network I'm calling "Network 2".  The third nic is facing another separate virtual network I'm calling "Network 3".  Now I have 1 windows 7 vm on network 2, and another on network 3.  Please note, these separate networks are all virtual, there is no physical infrastructure here.  Both virtual nics on networks 2&3, have the default allow all route to allow internet access.

      I have 2 goals today, my first is to create a static route from my bridged adapter to my machine on network 2.  Allowing me to use windows remote access program (RDP) to take control of that machine at will.

      My second is to try locking down both networks, to only allow traffic on certain ports.  Even better if I could limit the traffic on a given port.

      My problem is, I don't know how to go about doing this.  I'm honestly not sure what traffic should be allowed, and on what port.  Are there any links I could read up on regarding traffic limitations?

      Also, I can't seem to find a specific drop down menu option for the RDP protocol.  So, is there a way to limit that traffic in any way?

      Obstacles are those frightening objects we see, when we take our eyes of the objective.

      1 Reply Last reply Reply Quote 0
      • M Offline
        mattig89ch
        last edited by

        Ok, so i've been plugging away at this issue, and actually made progress.

        I found this guide: http://pc-addicts.com/building-ultimate-virtualbox-rdp-vms, and I was able to rdp through pfsense into a virtual machine.

        Now I'm trying to read over programs to see what ports they use.  And specifically open those ports, letting the auto block feature of pfsense, stop everything else.

        The programs I'm trying to keep open are windows update, microsoft dynamics RMS, and web browsers (specifically chome).  I don't use chrome on my personal machines, but most of my clients seem to prefer it, so I'm using it as a bit of practice.

        Obstacles are those frightening objects we see, when we take our eyes of the objective.

        1 Reply Last reply Reply Quote 0
        • M Offline
          mattig89ch
          last edited by

          For those who are looking at this thread, I'm still plugging away at this experiment of mine.

          I figured out all the ports to leave open, and put rules for them on the WAN interface.  Everything not covered by rules on that interface gets a deny, correct?

          Do I have to put these rules on the Lan interfaces as well?  Because right now, the only rules on that interface, are leaving ports 80 (http), 443 (https), and port 1433 (sql port).  As well as a forwarding rule that says anything coming in gets sent via rdp protocol to a specific machine.  But each lan interface has the default allow all rule (you guys helped me understand that rule, thanks again for that!).

          Edit: if I changed those rules on the wan interface, to floating rules.  Would those rules apply to everything the firewall does, instead of individual interfaces?

          Obstacles are those frightening objects we see, when we take our eyes of the objective.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.