OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • General Discussion »
  • Internet Only FW Rule
« previous next »
  • Print
Pages: [1]

Author Topic: Internet Only FW Rule  (Read 2206 times)

spetrillo

  • Hero Member
  • *****
  • Posts: 721
  • Karma: 8
    • View Profile
Internet Only FW Rule
« on: August 18, 2020, 06:23:22 pm »
Does anyone have a screenshot of a working fw rule that only allows Internet access?
Logged

banym

  • Sr. Member
  • ****
  • Posts: 468
  • Karma: 31
  • Free Human Being, FreeBSD, Linux and Mac nerd
    • View Profile
    • Banym
Re: Internet Only FW Rule
« Reply #1 on: August 18, 2020, 08:10:39 pm »
Maybe I know what you mean, but this question is not clear and I don't want to answer it on an assumption.

Please describe your environment and what you intend to do with such a rule. Do you want to block traffic flow between VLANs or private networks or what is the plan behind the question?
Logged
Twitter: banym
Mastodon: banym@bsd.network
Blog: https://www.banym.de

fabian

  • Hero Member
  • *****
  • Posts: 2769
  • Karma: 200
  • OPNsense Contributor (Language, VPN, Proxy, etc.)
    • View Profile
    • Personal Homepage
Re: Internet Only FW Rule
« Reply #2 on: August 18, 2020, 08:26:23 pm »
If you want to prevent local traffic you need an alias containing private networks.

Then allow all with destination !private
Logged

spetrillo

  • Hero Member
  • *****
  • Posts: 721
  • Karma: 8
    • View Profile
Re: Internet Only FW Rule
« Reply #3 on: August 18, 2020, 08:27:47 pm »
I have a SSID and associated vlan for my IoT devices. No need for them to see my local networks. Just want them to go outbound to the Internet.
Logged

spetrillo

  • Hero Member
  • *****
  • Posts: 721
  • Karma: 8
    • View Profile
Re: Internet Only FW Rule
« Reply #4 on: August 19, 2020, 08:38:27 pm »
Quote from: fabian on August 18, 2020, 08:26:23 pm
If you want to prevent local traffic you need an alias containing private networks.

Then allow all with destination !private

Wouldnt I block all private?
Logged

banym

  • Sr. Member
  • ****
  • Posts: 468
  • Karma: 31
  • Free Human Being, FreeBSD, Linux and Mac nerd
    • View Profile
    • Banym
Re: Internet Only FW Rule
« Reply #5 on: August 19, 2020, 09:22:14 pm »
It depends in what order you do it.

Here an example:

1. Allow all local traffic you need with specific defined networks or aliases (Example DNS/NTP and Connections you need to work between your IoT network and your LAN)
2. Block all traffic you want to block. for example all local RFC1918 traffic for IPv4
3. Allow all traffic to "ANY"

This will allow all defined local traffic to work before the block rule blocks all local traffic that is not defined in 1.
3. than catches all traffic that goes to external IPs and allows it.

Logged
Twitter: banym
Mastodon: banym@bsd.network
Blog: https://www.banym.de

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • English Forums »
  • General Discussion »
  • Internet Only FW Rule
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2