SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
1
Transparent Firewall/Filtering Bridge - pfSense 2.0.2
By William Tarrh
Version 2 – February 6, 2013
2
Transparent Firewall/Filtering Bridge - pfSense 2.0.2
This “how to” is an updated version of Trendchiller’s 2007 How to Setup a transparent firewall /filtering
bridge with pfSense based on pfSense 1.0-PREBETA2-BUG-VALIDATION-EDITION.
My contribution to this project is documenting what has been noted by others on the pfSense forum,
walking in Trendchiller’s footsteps and the submission of the document itself.
Special thanks to Chris Buechler, Scott Ullrich and all of those who contribute to the pfSense Forum.
I would also like to thank Dr. Jeff Rattray who helped me work through some of the kinks in this project.
3
Contents
Hardware Requirements and Setup Page 4
Initial Setup Page 4
pfSense GUI Login Page 4
Firewall – WAN - Anti-Lockout Rule Page 4
Configure WAN Interface Page 5
Enable and Configure LAN Interface Page 5
Enable and Configure the Bridge Page 6
Enable the Filtering Bridge Page 7
Enable Manual outbound NAT rule generation (AON – Advanced Outbound NAT) Page 8
Configure Hostname, Domain, DNS servers, Time zone, and NTP time server Page 8
Reboot pfSense Firewall Page 8
Restrict Access to the Management Interface Page 9
Overview and Understanding of the Transparent Bridge Page 11
4
1. Hardware Requirements and Setup
a. Two compatible NIC’s for the LAN and WAN interfaces.
pfSense Hardware Compatibility
2. Initial Setup
a. Upon completing a fresh installation of pfSense a restart will be required. After the first
reboot you will be greeted with “Do you want to set up VLANs now [y|n]?” Select “No”.
b. Next you will be requested to select your WAN interface or select ‘a’ for auto detection.
Select your desired WAN interface card from the list. Next you will be asked to select your
LAN interface card. Press “Enter”, we will configure this interface later.
c. At the welcome screen only setup the WAN interface. Assign this adapter a static address or
use the assigned DHCP address; we will use this address to configure the firewall from this
point on.
3. pfSense GUI Login
a. Open a browser window and enter the IP address assigned to the pfSense WAN interface.
The default username and password are admin and pfsense.
4. Firewall – WAN - Anti-Lockout Rule
a. First, let’s be sure not to get locked out of the WAN interface by setting up our own
temporary “anti-lockout” rule. Navigate to “Firewall” -> “Rules”. By default the “Anti-
Lockout” rule is applied to the WAN interface as seen below. As soon as the LAN interface is
enabled this “Anti-Lockout” rule will be migrated automatically to the LAN interface.
5
b. To create a new rule, select the ‘+’ on the bottom right-hand corner. This will take you to
the Rules: Edit page.
In the “Rules: Edit” create a rule that resembles the screen shot below. The rule below will
allow all traffic to access the WAN interface. Keep in mind this is a temporary rule. Select
“Save” and then “Apply Changes”.
5. Configure WAN Interface
a. Navigate to “Interfaces” -> “WAN” and scroll down to “Static IP configuration”. In the
“Gateway” field select “add a new one” and enter your Gateway.
b. Navigate to “System” -> “General Setup”; add your hostname, Domain and DNS Servers. To
the right of your DNS servers select your Gateway from the dropdown menus.
6. Enable and Configure LAN Interface
a. Navigate to “Interfaces” -> “(assign)”. Select the ‘+’ and then select your “LAN” interface.
Now select “Save” and then “Apply Changes”.
6
Navigate to “Interfaces” -> “LAN”. In General configuration check the “Enable Interface”
box. The screen will auto populate. Be sure that Type is set to “None”. “Save” and “Apply
Changes”.
7. Enable and Configure the Bridge
a. Now that our LAN and WAN interfaces are enabled and configured we can create the
Bridge. Navigate to “Interfaces -> (assign)” from the menu and then select the “Bridges” tab
to the far right. Select the ‘+’ to navigate to “Bridge:Edit”.
b. In “Bridge: Edit” hold the “Ctrl” key on your keyboard and select the “WAN” and “LAN” so
they are both highlighted. Assign your Bridge a name in the “Description” field. Select
“Save” and then “Apply Changes”.
7
c. Navigate to “Interfaces” -> “OPT1”. In General configuration check the “Enable Interface”
box. The screen will auto populate. You can also change the interface description at this
point, I have changed mine from “OPT1” to “Bridge”. Be sure that Type is set to “None”.
“Save” and “Apply Changes”.
8. Enable the Filtering Bridge
a. In the menu navigate to “System -> Advanced” and select the “System Tunables” tab.
b. Locate the “net.link.bridge.pfil_bridge” in the “Tunable Name” column and double-click it.
c. In the “Value” field change this from “Default” to “1”. Select “Save” and “Apply Changes”.
8
9. Enable Manual outbound NAT rule generation (AON – Advanced Outbound NAT)
a. From the menu select “Firewall -> NAT” and the “Outbound” tab.
b. Click “Manual outbound NAT rule generation (AON – Advanced Outbound NAT)” and
select “Save”. Delete any rules that auto-populate in the mappings area.
10. Configure Hostname, Domain, DNS servers, Time zone, and NTP time server.
a. From the menu select “System” -> “General Setup”.
b. Most fields can be left default but be sure to configure your DNS server and NTP time
server.
11. Reboot pfSense Firewall
a. In order to fully apply all changes reboot your pfSense firewall by going to “Diagnostics ->
Reboot”. In this menu select “Yes”.
9
12. Restrict Access to the Management Interface
a. This documentation was taken from doc.pfsens.org, I found it to be very helpful. I
configured the access restrictions on the LAN and WAN interfaces.
http://doc.pfsense.org/index.php/Restrict_access_to_management_interface
If you use a restrictive ruleset on your LAN, make sure it permits access to the web interface before
continuing.
Now disable the anti-lockout rule by going to the System -> Advanced page and checking the "Disable
webGUI anti-lockout rule" box. Click Save and the rule will be removed.
10
Now I suggest adding a network alias for management access, and if you use both web and SSH
administration, add an alias for those ports.
Now add a firewall rule allowing the sources defined in your management alias to the destination LAN
address, with the port used or alias created for those using multiple ports. Make sure this rule comes
first in the list. Then add a rule based on that rule (the + next to the rule), changing action to block or
reject (I prefer reject on internal networks), source to any, and destination the same. When finished
your ruleset should look like the following.
Apply your changes and your management interface is now restricted to only the defined hosts.
11
13. Overview and Understanding of the Transparent Bridge
I use the WAN as the management interface because I was unable to reach anything
external, obtain updates or browse packages when the LAN or Bridge was configured as the
management interface.
Treat the LAN and WAN interfaces as you would a standard firewall, keep in mind that the
default action in the transparent bridge is to block all traffic unless explicitly allowed in the
firewall. You will only need to setup rules on the LAN and WAN, I have yet to touch the
Bridge.
Generally a standard firewall will allow the LAN to ANY by default; allowing anything on the
LAN outbound. In this transparent bridge scenario you MUST create a rule to allow your LAN
outbound. As stated above the default behavior of the transparent bridge is to block unless
explicitly allowed.
Cheers!

Weitere ähnliche Inhalte

Was ist angesagt?

Tìm hiểu về giao thức mạng tcp ip
Tìm hiểu về giao thức mạng tcp ipTìm hiểu về giao thức mạng tcp ip
Tìm hiểu về giao thức mạng tcp ip
leduyk11
 
Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...
Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...
Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...
Manassé Achim kpaya
 
Thietbivanphong
ThietbivanphongThietbivanphong
Thietbivanphong
vnhieu
 
Membuat server sederhana dengan debian
Membuat server sederhana dengan debianMembuat server sederhana dengan debian
Membuat server sederhana dengan debian
Wida Astuti Npp
 
Thiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãi
Thiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãiThiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãi
Thiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãi
Hate To Love
 
Network engineer cv_template
Network engineer cv_templateNetwork engineer cv_template
Network engineer cv_template
pavel0808
 

Was ist angesagt? (20)

Chuong 3 man e
Chuong 3   man eChuong 3   man e
Chuong 3 man e
 
Báo cáo thực tập tuần 4 ospf đàm văn sáng
Báo cáo thực tập tuần 4 ospf  đàm văn sángBáo cáo thực tập tuần 4 ospf  đàm văn sáng
Báo cáo thực tập tuần 4 ospf đàm văn sáng
 
Tìm hiểu về giao thức mạng tcp ip
Tìm hiểu về giao thức mạng tcp ipTìm hiểu về giao thức mạng tcp ip
Tìm hiểu về giao thức mạng tcp ip
 
Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...
Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...
Mise en place d'un système de messagerie sous debian avec: postfix, dovecot, ...
 
Thietbivanphong
ThietbivanphongThietbivanphong
Thietbivanphong
 
Membuat server sederhana dengan debian
Membuat server sederhana dengan debianMembuat server sederhana dengan debian
Membuat server sederhana dengan debian
 
Kelompok 2 VoIP
Kelompok 2 VoIPKelompok 2 VoIP
Kelompok 2 VoIP
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
[Báo cáo] Bài tập lớn Tổ chức quy hoạch mạng viễn thông: Mentor
[Báo cáo] Bài tập lớn Tổ chức quy hoạch mạng viễn thông: Mentor[Báo cáo] Bài tập lớn Tổ chức quy hoạch mạng viễn thông: Mentor
[Báo cáo] Bài tập lớn Tổ chức quy hoạch mạng viễn thông: Mentor
 
Pembahasan Solusi Soal UTS Semester Genap 2023 - Praktikum Jaringan Komputer ...
Pembahasan Solusi Soal UTS Semester Genap 2023 - Praktikum Jaringan Komputer ...Pembahasan Solusi Soal UTS Semester Genap 2023 - Praktikum Jaringan Komputer ...
Pembahasan Solusi Soal UTS Semester Genap 2023 - Praktikum Jaringan Komputer ...
 
Chương 5: Khối thu phát
Chương 5: Khối thu phátChương 5: Khối thu phát
Chương 5: Khối thu phát
 
Pembahasan Solusi Perhitungan VLSM untuk Lab 11.9.3 Packet Tracer - VLSM Desi...
Pembahasan Solusi Perhitungan VLSM untuk Lab 11.9.3 Packet Tracer - VLSM Desi...Pembahasan Solusi Perhitungan VLSM untuk Lab 11.9.3 Packet Tracer - VLSM Desi...
Pembahasan Solusi Perhitungan VLSM untuk Lab 11.9.3 Packet Tracer - VLSM Desi...
 
Panduan Installasi dan Konfigurasi Debian Server 5.0
Panduan Installasi dan Konfigurasi Debian Server 5.0Panduan Installasi dan Konfigurasi Debian Server 5.0
Panduan Installasi dan Konfigurasi Debian Server 5.0
 
SOAL KELAS X TKJ ( KESELAMATAN DAN KESEHATAN KERJA DAN INSTALASI SISTEM OPERA...
SOAL KELAS X TKJ ( KESELAMATAN DAN KESEHATAN KERJA DAN INSTALASI SISTEM OPERA...SOAL KELAS X TKJ ( KESELAMATAN DAN KESEHATAN KERJA DAN INSTALASI SISTEM OPERA...
SOAL KELAS X TKJ ( KESELAMATAN DAN KESEHATAN KERJA DAN INSTALASI SISTEM OPERA...
 
[Báo cáo] Bài tập lớn: Thiết kế anten Yagi
[Báo cáo] Bài tập lớn: Thiết kế anten Yagi[Báo cáo] Bài tập lớn: Thiết kế anten Yagi
[Báo cáo] Bài tập lớn: Thiết kế anten Yagi
 
praktek mikrotik router dan tata cara
praktek mikrotik router dan tata carapraktek mikrotik router dan tata cara
praktek mikrotik router dan tata cara
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdf
 
Thiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãi
Thiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãiThiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãi
Thiết kế hệ thống mạng tại bưu điện tỉnh quảng ngãi
 
[Báo cáo] Bài tập lớn Thông tin số: MIMO OFDM
[Báo cáo] Bài tập lớn Thông tin số: MIMO OFDM[Báo cáo] Bài tập lớn Thông tin số: MIMO OFDM
[Báo cáo] Bài tập lớn Thông tin số: MIMO OFDM
 
Network engineer cv_template
Network engineer cv_templateNetwork engineer cv_template
Network engineer cv_template
 

Andere mochten auch

The Dark Side of Code Metrics
The Dark Side of Code MetricsThe Dark Side of Code Metrics
The Dark Side of Code Metrics
Donald Belcham
 
Maersk Line's Agile Journey LESS 2012
Maersk Line's Agile Journey LESS 2012 Maersk Line's Agile Journey LESS 2012
Maersk Line's Agile Journey LESS 2012
OzlemYuce
 
Spec flow – functional testing made easy
Spec flow – functional testing made easySpec flow – functional testing made easy
Spec flow – functional testing made easy
Paul Stack
 

Andere mochten auch (20)

Guide mise en oeuvre-pfsensev2
Guide mise en oeuvre-pfsensev2Guide mise en oeuvre-pfsensev2
Guide mise en oeuvre-pfsensev2
 
A Lap Around PowerShell 3.0
A Lap Around PowerShell 3.0A Lap Around PowerShell 3.0
A Lap Around PowerShell 3.0
 
Kanban in sw development
Kanban in sw developmentKanban in sw development
Kanban in sw development
 
StarEast2013 - kanban for test teams
StarEast2013 - kanban for test teamsStarEast2013 - kanban for test teams
StarEast2013 - kanban for test teams
 
The Dark Side of Code Metrics
The Dark Side of Code MetricsThe Dark Side of Code Metrics
The Dark Side of Code Metrics
 
Introduction to kanban
Introduction to kanbanIntroduction to kanban
Introduction to kanban
 
How to Get Started with Kanban, and Why
How to Get Started with Kanban, and WhyHow to Get Started with Kanban, and Why
How to Get Started with Kanban, and Why
 
Maersk Line's Agile Journey LESS 2012
Maersk Line's Agile Journey LESS 2012 Maersk Line's Agile Journey LESS 2012
Maersk Line's Agile Journey LESS 2012
 
Combating entropy in business
Combating entropy in businessCombating entropy in business
Combating entropy in business
 
Mvvm basics
Mvvm basicsMvvm basics
Mvvm basics
 
Spec flow – functional testing made easy
Spec flow – functional testing made easySpec flow – functional testing made easy
Spec flow – functional testing made easy
 
Identifying and managing waste in software product development
Identifying and managing waste in software product developmentIdentifying and managing waste in software product development
Identifying and managing waste in software product development
 
Kanban 101 - 3 - Kanban Essentials
Kanban 101 - 3 - Kanban EssentialsKanban 101 - 3 - Kanban Essentials
Kanban 101 - 3 - Kanban Essentials
 
Seven Types Of Waste: Setting Priorities For Improvement Discussion
Seven Types Of Waste: Setting Priorities For Improvement DiscussionSeven Types Of Waste: Setting Priorities For Improvement Discussion
Seven Types Of Waste: Setting Priorities For Improvement Discussion
 
Scrum-ban in practice
Scrum-ban in practiceScrum-ban in practice
Scrum-ban in practice
 
Waste Elimination
Waste  EliminationWaste  Elimination
Waste Elimination
 
Kanban 101 - 1 - Perfection, Waste and Value Stream Mapping
Kanban 101 - 1 - Perfection, Waste and Value Stream MappingKanban 101 - 1 - Perfection, Waste and Value Stream Mapping
Kanban 101 - 1 - Perfection, Waste and Value Stream Mapping
 
Alternate Hourly Lean Introduction
Alternate Hourly Lean IntroductionAlternate Hourly Lean Introduction
Alternate Hourly Lean Introduction
 
Kanban Basics for Beginners
Kanban Basics for BeginnersKanban Basics for Beginners
Kanban Basics for Beginners
 
Using Erlang on the RaspberryPi to interact with the physical world
Using Erlang on the RaspberryPi to interact with the physical worldUsing Erlang on the RaspberryPi to interact with the physical world
Using Erlang on the RaspberryPi to interact with the physical world
 

Ähnlich wie Transparent firewall filtering bridge - pf sense 2.0.2 by william tarrh

Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 

Ähnlich wie Transparent firewall filtering bridge - pf sense 2.0.2 by william tarrh (20)

PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3
 
Bsd routers
Bsd routersBsd routers
Bsd routers
 
Configuring sonic wall__port_forwarding
Configuring sonic wall__port_forwardingConfiguring sonic wall__port_forwarding
Configuring sonic wall__port_forwarding
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
 
Webinar NETGEAR - Prosafe VPN Firewall - Configurazione di NAT e Gestione del...
Webinar NETGEAR - Prosafe VPN Firewall - Configurazione di NAT e Gestione del...Webinar NETGEAR - Prosafe VPN Firewall - Configurazione di NAT e Gestione del...
Webinar NETGEAR - Prosafe VPN Firewall - Configurazione di NAT e Gestione del...
 
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
Webinar NETGEAR - La gestione wireless centralizzata con la modalità Ensemble
Webinar NETGEAR - La gestione wireless centralizzata con la modalità EnsembleWebinar NETGEAR - La gestione wireless centralizzata con la modalità Ensemble
Webinar NETGEAR - La gestione wireless centralizzata con la modalità Ensemble
 
How to publish your NAS on the Internet?
How to publish your NAS on the Internet?How to publish your NAS on the Internet?
How to publish your NAS on the Internet?
 
How to-troubleshoot-nat-related-issues
How to-troubleshoot-nat-related-issuesHow to-troubleshoot-nat-related-issues
How to-troubleshoot-nat-related-issues
 
Dev stacklabguide
Dev stacklabguideDev stacklabguide
Dev stacklabguide
 
Devstack lab guide
Devstack lab guideDevstack lab guide
Devstack lab guide
 
Tp link error codes
Tp link error codesTp link error codes
Tp link error codes
 
3- NIC Teaming
3- NIC Teaming3- NIC Teaming
3- NIC Teaming
 
Cover test
Cover testCover test
Cover test
 
FreeBSD, ipfw and OpenVPN 2.1 server
FreeBSD, ipfw and OpenVPN 2.1 serverFreeBSD, ipfw and OpenVPN 2.1 server
FreeBSD, ipfw and OpenVPN 2.1 server
 
VPNBee firewall/VPN/load balancer from Gayatri Hitech based on OpenBSD pf
VPNBee firewall/VPN/load balancer from Gayatri Hitech based on OpenBSD pfVPNBee firewall/VPN/load balancer from Gayatri Hitech based on OpenBSD pf
VPNBee firewall/VPN/load balancer from Gayatri Hitech based on OpenBSD pf
 
Webinar NETGEAR - WiFi 11AC gestito con il controller virtuale ENSEMBLE
Webinar NETGEAR - WiFi 11AC gestito con il controller virtuale ENSEMBLEWebinar NETGEAR - WiFi 11AC gestito con il controller virtuale ENSEMBLE
Webinar NETGEAR - WiFi 11AC gestito con il controller virtuale ENSEMBLE
 
Load Balancer Device and Configurations.
Load Balancer Device and Configurations.Load Balancer Device and Configurations.
Load Balancer Device and Configurations.
 

Kürzlich hochgeladen

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Kürzlich hochgeladen (20)

VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 

Transparent firewall filtering bridge - pf sense 2.0.2 by william tarrh

  • 1. 1 Transparent Firewall/Filtering Bridge - pfSense 2.0.2 By William Tarrh Version 2 – February 6, 2013
  • 2. 2 Transparent Firewall/Filtering Bridge - pfSense 2.0.2 This “how to” is an updated version of Trendchiller’s 2007 How to Setup a transparent firewall /filtering bridge with pfSense based on pfSense 1.0-PREBETA2-BUG-VALIDATION-EDITION. My contribution to this project is documenting what has been noted by others on the pfSense forum, walking in Trendchiller’s footsteps and the submission of the document itself. Special thanks to Chris Buechler, Scott Ullrich and all of those who contribute to the pfSense Forum. I would also like to thank Dr. Jeff Rattray who helped me work through some of the kinks in this project.
  • 3. 3 Contents Hardware Requirements and Setup Page 4 Initial Setup Page 4 pfSense GUI Login Page 4 Firewall – WAN - Anti-Lockout Rule Page 4 Configure WAN Interface Page 5 Enable and Configure LAN Interface Page 5 Enable and Configure the Bridge Page 6 Enable the Filtering Bridge Page 7 Enable Manual outbound NAT rule generation (AON – Advanced Outbound NAT) Page 8 Configure Hostname, Domain, DNS servers, Time zone, and NTP time server Page 8 Reboot pfSense Firewall Page 8 Restrict Access to the Management Interface Page 9 Overview and Understanding of the Transparent Bridge Page 11
  • 4. 4 1. Hardware Requirements and Setup a. Two compatible NIC’s for the LAN and WAN interfaces. pfSense Hardware Compatibility 2. Initial Setup a. Upon completing a fresh installation of pfSense a restart will be required. After the first reboot you will be greeted with “Do you want to set up VLANs now [y|n]?” Select “No”. b. Next you will be requested to select your WAN interface or select ‘a’ for auto detection. Select your desired WAN interface card from the list. Next you will be asked to select your LAN interface card. Press “Enter”, we will configure this interface later. c. At the welcome screen only setup the WAN interface. Assign this adapter a static address or use the assigned DHCP address; we will use this address to configure the firewall from this point on. 3. pfSense GUI Login a. Open a browser window and enter the IP address assigned to the pfSense WAN interface. The default username and password are admin and pfsense. 4. Firewall – WAN - Anti-Lockout Rule a. First, let’s be sure not to get locked out of the WAN interface by setting up our own temporary “anti-lockout” rule. Navigate to “Firewall” -> “Rules”. By default the “Anti- Lockout” rule is applied to the WAN interface as seen below. As soon as the LAN interface is enabled this “Anti-Lockout” rule will be migrated automatically to the LAN interface.
  • 5. 5 b. To create a new rule, select the ‘+’ on the bottom right-hand corner. This will take you to the Rules: Edit page. In the “Rules: Edit” create a rule that resembles the screen shot below. The rule below will allow all traffic to access the WAN interface. Keep in mind this is a temporary rule. Select “Save” and then “Apply Changes”. 5. Configure WAN Interface a. Navigate to “Interfaces” -> “WAN” and scroll down to “Static IP configuration”. In the “Gateway” field select “add a new one” and enter your Gateway. b. Navigate to “System” -> “General Setup”; add your hostname, Domain and DNS Servers. To the right of your DNS servers select your Gateway from the dropdown menus. 6. Enable and Configure LAN Interface a. Navigate to “Interfaces” -> “(assign)”. Select the ‘+’ and then select your “LAN” interface. Now select “Save” and then “Apply Changes”.
  • 6. 6 Navigate to “Interfaces” -> “LAN”. In General configuration check the “Enable Interface” box. The screen will auto populate. Be sure that Type is set to “None”. “Save” and “Apply Changes”. 7. Enable and Configure the Bridge a. Now that our LAN and WAN interfaces are enabled and configured we can create the Bridge. Navigate to “Interfaces -> (assign)” from the menu and then select the “Bridges” tab to the far right. Select the ‘+’ to navigate to “Bridge:Edit”. b. In “Bridge: Edit” hold the “Ctrl” key on your keyboard and select the “WAN” and “LAN” so they are both highlighted. Assign your Bridge a name in the “Description” field. Select “Save” and then “Apply Changes”.
  • 7. 7 c. Navigate to “Interfaces” -> “OPT1”. In General configuration check the “Enable Interface” box. The screen will auto populate. You can also change the interface description at this point, I have changed mine from “OPT1” to “Bridge”. Be sure that Type is set to “None”. “Save” and “Apply Changes”. 8. Enable the Filtering Bridge a. In the menu navigate to “System -> Advanced” and select the “System Tunables” tab. b. Locate the “net.link.bridge.pfil_bridge” in the “Tunable Name” column and double-click it. c. In the “Value” field change this from “Default” to “1”. Select “Save” and “Apply Changes”.
  • 8. 8 9. Enable Manual outbound NAT rule generation (AON – Advanced Outbound NAT) a. From the menu select “Firewall -> NAT” and the “Outbound” tab. b. Click “Manual outbound NAT rule generation (AON – Advanced Outbound NAT)” and select “Save”. Delete any rules that auto-populate in the mappings area. 10. Configure Hostname, Domain, DNS servers, Time zone, and NTP time server. a. From the menu select “System” -> “General Setup”. b. Most fields can be left default but be sure to configure your DNS server and NTP time server. 11. Reboot pfSense Firewall a. In order to fully apply all changes reboot your pfSense firewall by going to “Diagnostics -> Reboot”. In this menu select “Yes”.
  • 9. 9 12. Restrict Access to the Management Interface a. This documentation was taken from doc.pfsens.org, I found it to be very helpful. I configured the access restrictions on the LAN and WAN interfaces. http://doc.pfsense.org/index.php/Restrict_access_to_management_interface If you use a restrictive ruleset on your LAN, make sure it permits access to the web interface before continuing. Now disable the anti-lockout rule by going to the System -> Advanced page and checking the "Disable webGUI anti-lockout rule" box. Click Save and the rule will be removed.
  • 10. 10 Now I suggest adding a network alias for management access, and if you use both web and SSH administration, add an alias for those ports. Now add a firewall rule allowing the sources defined in your management alias to the destination LAN address, with the port used or alias created for those using multiple ports. Make sure this rule comes first in the list. Then add a rule based on that rule (the + next to the rule), changing action to block or reject (I prefer reject on internal networks), source to any, and destination the same. When finished your ruleset should look like the following. Apply your changes and your management interface is now restricted to only the defined hosts.
  • 11. 11 13. Overview and Understanding of the Transparent Bridge I use the WAN as the management interface because I was unable to reach anything external, obtain updates or browse packages when the LAN or Bridge was configured as the management interface. Treat the LAN and WAN interfaces as you would a standard firewall, keep in mind that the default action in the transparent bridge is to block all traffic unless explicitly allowed in the firewall. You will only need to setup rules on the LAN and WAN, I have yet to touch the Bridge. Generally a standard firewall will allow the LAN to ANY by default; allowing anything on the LAN outbound. In this transparent bridge scenario you MUST create a rule to allow your LAN outbound. As stated above the default behavior of the transparent bridge is to block unless explicitly allowed. Cheers!