Table of Contents

PFSense - Install pfSense - Create Firewall Rules

WAN Firewall Rules

Navigate to Firewall → Rules → WAN.

There should be two default rules already created on this page, due to the autogeneration of rules option configured on the WAN Interface.


LAN Firewall Rules

Navigate to Firewall → Rules → LAN.

LAN Firewall rules will cover:


Anti-Lockout

There should be a default Anti-Lockout rule already created on this page.


Allow ICMP Pings

NOTE: This is not actually needed here, as the Permit Traffic Rules defined next will also allow pings.

The reason this is included here separately is that we log any pings, and to cater for future changes.


Permit Traffic Rules

There should already be default Permit Traffic Rules.

NOTE: These rules allow all traffic through from the LAN.

This may be too Open, as they allow all traffic.

To secure this better, these default rules could be blocked and replaced with only allowing specific traffic.


The final ruleset for the LAN will be:


CLEAR Firewall Rules

Navigate to Firewall → Rules → CLEAR.

The requirements for this interface are:


Allow traffic from CLEAR interface to Printers

Navigate to Firewall → Rules.

Select CLEAR.

NOTE: This allows users of the CLEAR network to access the Printers.


Allow traffic from CLEAR interface to the Internet

Navigate to Firewall → Rules.

Select CLEAR.

NOTE: This allows users of the CLEAR network to access the internet.


The final ruleset for the CLEAR will be:


IOT Firewall Rules

Navigate to Firewall → Rules → IOT.

IOT devices should be prevented from accessing anything that is not-essential to them.

The requirements for the IOT interface are:


Allow ICMP Pings


Redirect DNS lookups

Navigate to Firewall → NAT.

Select Port Forward.

Click Add.

Click Save and Apply.


Redirect NTP lookups

Navigate to Firewall → NAT.

Select Port Forward.

Click Add.

Click Save and Apply.


Validate DNS & NTP Redirects

Navigate to Firewall → Rules.

Select IOT.

There should be two rules created for the NTP and DNS redirects at the bottom.


Reject traffic to other internal interfaces

Navigate to Firewall → Rules.

Click IOT.

NOTE: Reject is used, instead of Block, as it returns quicker.


Allow IOT to Access the Internet


Block unknown IPv4

NOTE: Reject is used rather than block on internal interfaces to provide a response to any programs trying to send traffic preventing delays associated with waiting for time outs to occur.


Block unknown IPv6

NOTE: Reject is used rather than block on internal interfaces to provide a response to any programs trying to send traffic preventing delays associated with waiting for time outs to occur.


The final ruleset for the IOT will be:


GUEST Firewall Rules

Guests are not allowed to access any internal devices or subnets.

The requirements for the guest interface are:


Allow ICMP Pings

Navigate to Firewall → Rules.

Click GUEST.


Deny traffic to other internal interfaces


Allow Guest to Access the Internet

This permits the external access including DNS/port 53 and NTP/port 123 traffic.

NOTE: On the GUEST network no redirection is made for DNS (port 53) or NTP (port 123) traffic, so this rule will also allow this traffic out.


The final ruleset for the GUEST will be:


Return to Install pfSense or continue to Reboot and Verify.