Bobcares

pFSense DMZ Setup Guide

by | Jun 30, 2022

pFSense DMZ setup guide is here to make this task easy. Read on to find out more. 

At Bobcares, we offer solutions for every query, big and small, as a part of our Server Management Services.

Let’s take a look at how our Support Team helped our customers with setting up pFSense.

pFSense DMZ Setup Guide

DMZ also known as Demilitarized zone can be described as a type of network that enables us to deploy public internet-facing servers. Although it is similar to the LAN network, there are a few dissimilarities as well. Today, our Support Team is going to take us through the process of setting up a DMZ network in the pFSense firewall.

 

pFSense DMZ Setup

  • Configure the DMZ interface
  • Configure the Pfsense DMZ IP address
  • Block traffic from DMZ to the LAN
  • Allow the LAN users to access DMZ
  • Allow Internet access from DMZ
  • Allow inbound access
  • Allow HTTPS port from outside to web server

How to configure the DMZ interface

To begin with, head to Assignments under Interfaces in pFSense to see a list of available interfaces. We will see only 2 interfaces in case only 2 are configured. In some cases, we may also not see any available ports.

In that scenario, we have to rely on VLAN and choose an available port and click Add and Save.

After it is added, the new interface will appear as OPT1.

How to configure the pFSense DMZ IP address

Now, we have to enable the OPT1 interface from the previous step. In order to do that, click the OPT1 interface and select the checkbox next to Enable interface.

Then enter the descriptions as DMZ and iPv4 configuration type as Static Ipv4. We have to select the subnet as per our network size and enter the Ipv4 address before clicking Save.

How to block traffic from DMZ to the LAN

Next, we have to prevent the DMZ network from entering the LAN side of the network. In order to do this, navigate to Firewall > Rules > DMZ and click Add to add new rules.

  • Action: Block
  • Interface: DMZ
  • Address Family: IPv4
  • Protocol: Any
  • Source: DMZ Net
  • Destination: LAN net

How to allow the LAN users to access DMZ

The default LAN rule allows us to access the pFSense DMZ from the LAN. All we have to do is enable it.

How to allow Internet access from DMZ

We have to create an alias for the servers and ports by navigating to Firewall > Alias > Ports.

  • Name: Internet_Ports
  • Description: Enter a description

Then, click Add and add the Alias for internet-enabled pFSense DMZ hosts by heading to Firewall > Alias > IP.

  • Name: DMZ_internet_enabled_hosts
  • Under hosts, click Add and then Save

Then we have to create firewall rules in order to allow internet access.

How to allow inbound access

We are going to allow inbound access with pfsense DMZ port forwarding. It involves configuring the DMZ port forwarding by heading to Firewall > NAT > Port Forward > Add.

How to allow HTTPS port from outside to web server

At this point we will allow traffic from the internet on the HTTPS port by heading to Firewall > Rules > WAN > Then click Add rules

  • Action: Pass
  • Interface: WAN
  • Address Family: IPv4
  • Protocol: TCP
  • Source: Any

[Need assistance with a different issue? We are available 24/7.]

Conclusion

To conclude, our skilled Support Engineers at Bobcares took us through setting up pFSense DMZ and ensuring inbound access and internet access are available.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Never again lose customers to poor
server speed! Let us help you.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF