Navigate to Firewall → Rules → WAN.
There should be two default rules already created on this page, due to the autogeneration of rules option configured on the WAN Interface.
Navigate to Firewall → Rules → LAN.
LAN Firewall rules will cover:
NOTE: This is not actually needed here, as the Permit Traffic Rules defined next will also allow pings.
The reason this is included here separately is that we log any pings, and to cater for future changes.
There should already be default Permit Traffic Rules.
NOTE: These rules allow all traffic through from the LAN.
This may be too Open, as they allow all traffic.
To secure this better, these default rules could be blocked and replaced with only allowing specific traffic.
The final ruleset for the LAN will be:
Navigate to Firewall → Rules → CLEAR.
The requirements for this interface are:
Navigate to Firewall → Rules.
Select CLEAR.
NOTE: This allows users of the CLEAR network to access the Printers.
Navigate to Firewall → Rules.
Select CLEAR.
NOTE: This allows users of the CLEAR network to access the internet.
The final ruleset for the CLEAR will be:
Navigate to Firewall → Rules → IOT.
IOT devices should be prevented from accessing anything that is not-essential to them.
The requirements for the IOT interface are:
Navigate to Firewall → NAT.
Select Port Forward.
Click Add.
Click Save and Apply.
Navigate to Firewall → NAT.
Select Port Forward.
Click Add.
Click Save and Apply.
Navigate to Firewall → Rules.
Select IOT.
There should be two rules created for the NTP and DNS redirects at the bottom.
Navigate to Firewall → Rules.
Click IOT.
NOTE: Reject is used, instead of Block, as it returns quicker.
NOTE: Reject is used rather than block on internal interfaces to provide a response to any programs trying to send traffic preventing delays associated with waiting for time outs to occur.
NOTE: Reject is used rather than block on internal interfaces to provide a response to any programs trying to send traffic preventing delays associated with waiting for time outs to occur.
The final ruleset for the IOT will be:
Guests are not allowed to access any internal devices or subnets.
The requirements for the guest interface are:
Navigate to Firewall → Rules.
Click GUEST.
This permits the external access including DNS/port 53 and NTP/port 123 traffic.
NOTE: On the GUEST network no redirection is made for DNS (port 53) or NTP (port 123) traffic, so this rule will also allow this traffic out.
The final ruleset for the GUEST will be:
Return to Install pfSense or continue to Reboot and Verify.