BeachBum
Regular Contributor
I would suggest to use also pfBlockerNG which now supports DNS blocks.
Sent from my iPad using Tapatalk
Wolf, what exactly would you use pfBlockerNG for in this situation?
I would suggest to use also pfBlockerNG which now supports DNS blocks.
Sent from my iPad using Tapatalk
I also want to setup log analysis like ELK or Splunk, but haven't got into that yet.
One hiccup I'm having is that when my wife connects her VPN to her work. A computer on her companies network tries to port scan my network and Snort blocks it which results in her not being able to use her VPN. I'm debating wether to suppress that or not as I don't feel they should be port scanning my network.
My pfSense is set to block everything except what I decided to allow. I am not scared of external threats since unsolicited WAN traffic is blocked by default. My focus is on internal clients and the possibility to get into malicious sites and content. pfBlockerNG blocks clients to start connections with ip ranges and DNS that I blacklisted. Snort is in warning/watching state, I check snort logs for suspicious behavior. Each client (PC) uses itsown antivirus, I don't run any on pfSense.Wolf, what exactly would you use pfBlockerNG for in this situation?
Her VPN will not connect with the port knocking machine blocked. I allow Snort to block it, but I imagine letting the FW block it would cause the same problem,no? If I remember correctly her VPN Client app is Cisco.should be able to put snort into a warn state vs. block, and then just block that machine at the FW...
it's probably the VPN server port knocking the client to check that it is who is says it is - any mention of what the VPN client software is?
My pfSense is set to block everything except what I decided to allow. I am not scared of external threats since unsolicited WAN traffic is blocked by default. My focus is on internal clients and the possibility to get into malicious sites and content. pfBlockerNG blocks clients to start connections with ip ranges and DNS that I blacklisted. Snort is in warning/watching state, I check snort logs for suspicious behavior. Each client (PC) uses itsown antivirus, I don't run any on pfSense.
Any external connection to my LAN is via VPN.
Basically I use pfSense firewall capabilities plus pfBlockerNG as the sole defense wall.
Sent from my iPad using Tapatalk
I guess I kind of do that same thing with Squid/SquidGuard...
Her VPN will not connect with the port knocking machine blocked. I allow Snort to block it, but I imagine letting the FW block it would cause the same problem,no? If I remember correctly her VPN Client app is Cisco.
Yes Squid can do, I prefer pfBlockerNG because uses natively pfSense firewall and unbound, few resources and great effectiveness.
Nope. It uses IP and DNS lists to block, passing IP to firewall (Floating Rules) and DNS to Unbound (towards a thrash/fake DNS Server). It simply block, no scan of traffic content like Snort.Does PFBNG do AV scanning of traffic?
OK, so would I do that in the Services/Snort/Pass Lists? Looks like I'd need to create an Alias list first under Firewall/Aliases, correct?Yep, same here - you have to whitelist that IP/Range of IP's...
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!