Comprehensive Guide to pfSense 2.3 Part 8: Firewall and NAT Rules

Поділитися
Вставка
  • Опубліковано 5 лют 2025
  • Overview of the firewall and NAT rules in pfSense.
    Part 1: • Comprehensive Guide to...
    Part 2: • Comprehensive Guide to...
    Part 3: • Comprehensive Guide to...
    Part 4: • Comprehensive Guide to...
    Part 5.1: • Comprehensive Guide to...
    Part 5.2: • Comprehensive Guide to...
    Part 5.2-2: • Comprehensive Guide to...
    Part 5.3: • Comprehensive Guide to...
    Part 5.4: • Comprehensive Guide to...
    Part 6: • Comprehensive Guide to...
    Part 7: • Comprehensive Guide to...
    Part 9: • Comprehensive Guide to...
    I have a second channel:
    / @markfurneaux2659

КОМЕНТАРІ • 82

  • @TheUbuntuGuy
    @TheUbuntuGuy  7 років тому +36

    Part 9 will be on the Traffic Shaper, and will be released in a week or two. It will be quite in depth, and is shaping up to be the longest video yet (no pun intended).

    • @darryllawler2777
      @darryllawler2777 7 років тому +11

      This is great news!! Thank you so much for continuing this series. I know you mentioned, in the past, that they take a ton of your time. I genuinely appreciate you donating that time to us so we can better understand pfsense and take control of our internet connection. Please know that your effort is met with sincere and massive amounts of gratitude. Keep up the great work, Mark!!

    • @Dazdigo
      @Dazdigo 7 років тому +2

      Your videos were very helpful with assisting me with setting up my pfsense router and understanding the concepts. Thank you.

    • @miamidan44
      @miamidan44 7 років тому

      If it wasn't intended, it should have been. Made me laugh. I am just stumbling upon this video as I am searching for knowledge about the traffic shaper wizard. I am trying to figure out go to learn what all the little abbreviations mean and which would be best for me to set as low, default, or high priority given my needs. But I cannot know unless I know what they stand for, or at least what the purpose for each is. I see the post I am replying to was posted about a week ago, so I'm going to go check to see if you hopefully have uploaded it yet. I learned most of what I know about pfsense from your videos last year or the year before(?), I don't remember. But I remember you stopped just before Captive Portal, which at that time I was considering and was disappointed. It turned out that I haven't needed it.
      I said I learned the most from you so far, but that's not really intended to mean I know anything at all. I have to go back and rewatch all of them again because I'm really clueless on just about everything, all the networking and hardware terminology, and settings and what they do, and yada yada yada. I'm beginners are an advance level for me!
      My situation, however, is such that I have very little money for myself each month or else I could afford to pay someone to teach me. I think Netgate offers that. But even then I think to take those classes you have to already have a basic understanding of networking structures and jargon. Because of that I am very grateful for your kindness in making these videos for us. So may I just say thank you!!

  • @thomashong7
    @thomashong7 Рік тому +1

    Six years later I just had time to watch the whole video. Best clear, concise, informational video. Still a gem. Thank you!

  • @tokoiaoben3842
    @tokoiaoben3842 2 роки тому +1

    This is an old channel but still relevant and covers alot of grounds for people who wish to learn pfsense firewall rules. For the floating rules part I think it helps alot when say you have an internal messaging app for instance that you want everyone in your organisation to use for internal communication ... and you have several vlans ... normally you will create separate rule for each vlan to access this app (this app has its own vlan too) ... it would be alot more easier to just create one floating rule that will be available for all the vlans created.

  • @bryanscott2621
    @bryanscott2621 7 років тому

    Thank you so much for picking this back up. I had began my pfSense journey with your videos, and when you decided not to continue them I had to source other information which was not quite as concise. I did figure it out though, and it's cool to watch this video in relation to how far my knowledge has already come along. It would be helpful, although I already have it working, to see how you would configure the outbound NAT and firewall rules for use with a VPN provider. This is what led me to using pfSense over a consumer grade router. I needed the processing power to run all of my LAN devices through a VPN. I have also started using pfSense boxes in client businesses. It's a great platform! Thanks again for your dedication to helping others. It is greatly appreciated by many.

  • @MrCaLFreddyG
    @MrCaLFreddyG 5 років тому

    He hopes it was useful haha, this was the most useful on pf sense yet. Been looking at 2.4 videos but none of them as useful as this man. Stands the test of time and gives a solid explanation not just on pfsense but routing and firewall concepts as a whole. Couldn't ask for much more.

  • @RichDurso
    @RichDurso 7 років тому +2

    I've been running pfSense for several years. I somehow magically figured out the right combination of mouse clicks to get 3 interfaces working as I needed. Your video series has GREATLY improved my configuration and confidence in my implementation. Your work here is much appreciated.

  • @humansloth4096
    @humansloth4096 5 років тому

    Excellent video. Concise and to the point. No droning on and clearly you know the topic. Thank you.

  • @vgracanin
    @vgracanin 7 років тому +5

    Thanks for continuing the series, it is probably one of the most detailed and explained pfsense videos I have found online. Keep it up.

  • @syndendesign
    @syndendesign 7 років тому +10

    yaay! i'm so glad you're back!! thank you for the video! hope we'll get more soon. you have a good voice to listen to.

  • @NavidGowani
    @NavidGowani 7 років тому +36

    Finally :D the best content on pfsense resumes

    • @waynepatrick4219
      @waynepatrick4219 7 років тому

      I second this, well thought out and presented video series, answered many questions I had about the pfSense firewall.
      Can you please do a traffic shaping video as this is just as complex as the firewall.

    • @oskarhammarstrom5075
      @oskarhammarstrom5075 7 років тому

      As do I!
      I was just baffled that they came back since Marc said he wouldnt do more of them, looking forward to moe Marc!

  • @alexanderkurgat3481
    @alexanderkurgat3481 7 років тому +4

    Hi Mark, am so glad for you to have such a comprehensive series....keep up your good work. So I have a suggestion; if you finish this pfSense Series, can you do a comprehensive series on freeNAS please?! Hope to hear from you. Have a lovely day.

  • @AdigaAs21
    @AdigaAs21 7 років тому +2

    I am glad you did this video. I watched all your pfsense videos. Thank for your videos.

  • @venividioblitus
    @venividioblitus 7 років тому

    Hi Mark
    There is one thing I'd like to point out here. You said that sending a reject could alert an attacker that there is a firewall, but this completely depends on how the rest of the firewall is set up. If I set up a regular server on a network and simply don't listen on any port externally then all ports will return ICMP "Port Unreachable". So in that case, dropping packets to a port (e.g. SSHD) would alert an attacker that something is externally listening there and apparently some address[es] have access (or it's a misconfiguration because if you don't want anyone to connect externally, why listen externally). However if your router is already dropping all packets sent to it, then yes, sending a reject on a specific port would absolutely show a firewall is present.
    My point is just that people need to understand that the key here is make sure your "drop" behaviour mirrors your normal behaviour because it's the deviation that gives away the presence of a firewall, not reject or drop specifically.

  • @instantwatch1492
    @instantwatch1492 2 роки тому

    Thank you so much! The nat reflection part explained the situation I encounter or 2 weeks!!!

  • @nadirnikakhtar1129
    @nadirnikakhtar1129 4 роки тому

    Brilliant series! Always find myself coming back to your resource! thanks very much sir!

  • @marcosmigliorini1440
    @marcosmigliorini1440 7 років тому

    Let me say thank you very much, Mark, for this videos!!! Marcos from Argentina

  • @thomaslidstrom519
    @thomaslidstrom519 7 років тому +3

    Thank you for taking up this EXCELLENT series of videos!!!

  • @dartrunner4599
    @dartrunner4599 7 років тому +3

    Thank you so much for continuing your series!

  • @napiray
    @napiray 7 років тому +2

    Thanks for continuing with the CG to pfSense. Great job!

  • @syotos8643
    @syotos8643 7 років тому +3

    Thanks for bringing this back! Awesome job as always. Hope you continue them.

  • @KeithTingle
    @KeithTingle 5 років тому

    just wanted to say this incredibly well done and helpful

  • @tanveerahmed1274
    @tanveerahmed1274 7 років тому +6

    Have been waiting for this... Thanks Mark.. great video

  • @swedishdissident3406
    @swedishdissident3406 5 років тому

    Very good, clear and logical. Thankyou.

  • @killahinternetcafe9623
    @killahinternetcafe9623 7 років тому +1

    Thanks Mark for continuing this awesome guide.

  • @brunomendonca5038
    @brunomendonca5038 7 років тому

    Thank you so much for this. I have been learning a lot with your PFSense videos!

  • @brittaniemann1281
    @brittaniemann1281 4 роки тому

    thanks for this tutorial! although already a couple of years old, i think it's still useful for beginners like me. best wishes from .de :)

  • @patrik5123
    @patrik5123 7 років тому +3

    AWESOME! Thanks so much for continuing this series!

  • @Morganfreestyler
    @Morganfreestyler 7 років тому +2

    Thanks Mark, keep up the good work , realy like your video`s about pfSense.

  • @cichlid98
    @cichlid98 7 років тому

    Thank you very much for continuing this series Mark!!!

  • @MohamedAhmed-cj2sv
    @MohamedAhmed-cj2sv 7 років тому

    Thanks for your back! Awesome job as always. Hope you continue them.

  • @hesperaux
    @hesperaux 6 років тому

    I really appreciate the effort you put into this. The fact that you pause and describe and explain the meaning of things is what makes this video useful to me. Anyone can copy form data from a tutorial and create a video and verbally say "put this here because reasons," but explaining what it means is much more valuable. Thanks for the video.
    I'm trying to route between VLANs and I'm getting very confused by the ingress and egress of packets related to the firewall. This video helped me understand that it is incoming connections only. Since the VLAN X has IPs on subnet X, I need to allow connections on VLAN X's interface coming from other VLANs that should be able to connect. Is that correct. No egress rules are needed?
    I am asking about egress because in your allow all (blacklist fallback) rule, you described it as an egress rule, and yet the rules are matched on incoming connection requests. This was a little confusing to me. Can you clarify if and/or when egress rules make sense in an inter-vlan configuration? Thanks again!

  • @HestnetIT
    @HestnetIT 5 років тому

    Thanks. Perfect video to fill in the gaps and get everything working for me. I'm excited to start hosting some servers on my public IPv4 subnet.

  • @Oswee
    @Oswee 5 років тому

    Man! You have a talent!!!

  • @reyvarela6315
    @reyvarela6315 7 років тому

    Thank you so much for the videos. They are very professional and very good help too!!

  • @jamesking7868
    @jamesking7868 7 років тому

    thank you this is by way the most useful video on pfsense firewall rules.

  • @rickardhogan5664
    @rickardhogan5664 7 років тому +1

    Fantastic video Mark! Many thanks!

  • @maxharrison9918
    @maxharrison9918 7 років тому +3

    Just wanted to say thanks. Thanks

  • @k1ngjulien_
    @k1ngjulien_ 7 років тому +6

    OMFG! ITS A PFSENSE TUTORIAL!

  • @rosaldanha
    @rosaldanha 5 років тому

    Thank you for sharing such knowledge ! Very useful.

  • @lucafrondoni
    @lucafrondoni 7 років тому +3

    Excellent! Looking forward to the remaining parts

  • @lbrwnie
    @lbrwnie 7 років тому

    Great video! A tutorial on setting up an openvpn server so you can access your network remotely would be awesome. A lot of tutorials out there don't go into depth\skip steps

  • @CaladorPTN
    @CaladorPTN 7 років тому +1

    Thank You ver much for your time and effort! Appreciated!

  • @darryllawler2777
    @darryllawler2777 7 років тому +1

    Thank you so much, Mark!!!

  • @lewin555
    @lewin555 7 років тому

    I've searched and bought eLearning videos about network security mostly because it was including a section about pfSense. However, while it was a professional I've never been shown what is happening in details like you do. Knowing that it's always understandable without being a network specialist. I can't wait to finish this video and go next to the traffic shaper functionnality that I'd like to understand.
    Do you intend to add something one day about packets inspection (Snort or Surricata) ? .I would be interested to understand that point introduced the same way you did for the introduction slides: pros & cons, ex: if there is some added value in a home network.
    Thanks

  • @humansofceylon8046
    @humansofceylon8046 7 років тому

    Hey Mark, awesome series, learnt everything I know about PFsense through your videos. Thank you for sharing your knowledge.
    One question though, for which I have been struggling for a while, how do you block Facebook and UA-cam on Pfsense the right way ?

  • @wayneclements7202
    @wayneclements7202 7 років тому

    Great stuff Mark, Thankyou mate.

  • @MAbdilahi
    @MAbdilahi 7 років тому

    thanks for this amazing video's I just want ask you the choice of between Sophos utm and pfs firewall

  • @JesterHammer
    @JesterHammer 6 років тому

    Awesome video. Thank you!

  • @jaimedpcaus1
    @jaimedpcaus1 7 років тому

    Hi,
    I'm trying to make opt1 work using a d-link switch. Do I have to create a system route in pfsense? Will creating an interface be enough, with a few rules to let traffic in, to test if the opt1 works?

  • @sebsefyu
    @sebsefyu 6 років тому

    Fantastic tutorial. You should do Snort & it's rules and pfBlocker Comprehensive guides. There really isn't good one on youtube.

  • @marcopaolo1998
    @marcopaolo1998 7 років тому

    i love u Mark , Thanks for resuming this guide:-)

  • @justfmeupfam
    @justfmeupfam 7 років тому

    Any chance of a video on a comprehensive guide for Suricata?

  • @davejoseph5615
    @davejoseph5615 5 років тому

    So.... the first LAN port has a different implicit ruleset than any additional (i.e. optional) LAN ports? I know it has a default anti-lockout rule, but... is that all?

  • @linuxcow9870
    @linuxcow9870 7 років тому +2

    cool , finally a follow up , like earned :D

  • @XsissisX
    @XsissisX 7 років тому

    Thank you for this great explanation, turns out I've been doing it wrong because I haven't actually been using NAT rules where I shouldn't have, I was using just general interface rules. I have a question, I happen to have (rent) a small block of IPs. I use 1:1 NAT to connect a single IP to a single VM on my ESXi server. I was wondering if you could explain what exactly is matched with the "WAN address" and "WAN net" aliases when configuring a firewall rule or NAT rule. I have a bit of a complicated setup because the gateway I use is "far". As in, it is outside the subnet, but it works. Now I wonder does "WAN address" match the standard gateway, and does "WAN net" match that and the IP I have configured using 1:1 NAT? Or how does this work?
    Thank you in advance for an explanation!

  • @chrismoore9997
    @chrismoore9997 7 років тому

    Thanks for making this video! I will have to finish watching once I get home from work. Please make one about how to install and configure squid proxy, transparent cashing proxy.

  • @81keyholder
    @81keyholder 7 років тому

    Mark... port forwarding isn't working for me as I'm trying to get my cod server online but pfsense is blocking it. The host also has it's Windows firewall disabled. Any ideas.. rule set via Nat port mapping.

  • @TableWolfMusic
    @TableWolfMusic 7 років тому

    Since i7 computers and quite possibly i5 or earlier (i3 etc) computers have backdoors (see Dave Cullen's ComputingForever video) and considering that pfsense with its new requirements increases the chances of a person using those computers for it, would you ever consider making an OPNsense video in such glorious detail? I think you pfsense video detail level is great.

  • @abdraoufx
    @abdraoufx 7 років тому

    what is the difference between wan net and Wan address. or Lan net vs Lan address.!?
    I didn't understand the meaning from the pfsense wiki.

  • @Martin-ot7xj
    @Martin-ot7xj 5 років тому

    Hi there, how we can make a rule on firewall that all traffic will be blocked by default. I mean lan can access to Internet but all attack or trrafic from Internet or wan to lan will be blocked?? Because by default there's no rule set on microtik firewall. Thnx

  • @pcampanotti
    @pcampanotti 7 років тому

    Thanks Mark!

  • @ralmslb
    @ralmslb 7 років тому

    Thank you very much

  • @joebonsaipoland
    @joebonsaipoland 7 років тому

    good stuff thanks

  • @VadhanSs
    @VadhanSs 7 років тому

    plz show me how to setup port forwarding for ftp..am using windows ftp server

  • @pigboiii
    @pigboiii 7 років тому +2

    damn it has been a long time

    • @pigboiii
      @pigboiii 7 років тому +2

      I am very happy to see this btw! didnt mean to be negative.

  • @noxlupi1
    @noxlupi1 3 роки тому

    Reject vs Block. Is like the difference between a locked car, and an invisible car.

  • @MirkWoot
    @MirkWoot 7 років тому

    Thanks a lot for this series of videos :). I got a question if someone is listening. By default Pfsense blocks everything going in?, and allows everything going out?. But how then can I even surf the internet?, how can i remotely switch off my lights with Phillips Hue...
    And what is with the firewall logs saying it blocks something going from LAN to WAN.. Maybe I am just confusing things?, same with me feeling it is very illogical that when you make NAT rule, that you set destination to WAN and not LAN...

    • @TheUbuntuGuy
      @TheUbuntuGuy  7 років тому

      It blocks *new* incoming connections, but will allow replies to existing connections that originated outgoing. You can browse the web because you initiated the connection. NAT rules are from the perspective of the Internet, so the destination is the WAN because that is what faces outwards from your network.

  • @SooperBeez
    @SooperBeez 7 років тому +2

    nice

  • @nirv
    @nirv 3 роки тому

    42:35 - nat reflection. You know your stuff about networking, dude, but I think options like this would benefit from a real-world example such as the one I immediately thought of.
    Say you host a Counter-Strike 1.5 server on a server machine in your living room. You, for whatever reason, happen to find a working copy of Gamespy 3D server scanner from the early 2000s and you somehow have a working list and you see your CS server right there along with your internet IP. You see there are 23/24 players so you double click it to connect and game and it works! It works because you clicked that Nat Reflection option.
    I could think of others, but this option sounds like it'd be very helpful for someone like me who actually does stuff like this on my own network. I guess DDWRT must do it automatically somewhere because I never had to click an option like this.

  • @England91
    @England91 7 років тому

    I'm guessing npt is similar to nbt in Minecraft

  • @152drake164
    @152drake164 7 років тому

    YES!!!!

  • @Awoody002
    @Awoody002 7 років тому

    Magic. Ta

  • @theNEOone
    @theNEOone 7 років тому +3

    YEEEEESSSSSSSSSSSSSSSSSSSSSSSSSS