Project

General

Profile

Actions

Feature #588

closed
DC DC

pfSense DMZ Trap Door Rule

Feature #588: pfSense DMZ Trap Door Rule

Added by Daniel Curtis over 10 years ago. Updated over 10 years ago.

Status:
Closed
Priority:
High
Assignee:
Category:
Firewall/Router
Target version:
Start date:
03/31/2015
Due date:
% Done:

100%

Estimated time:
0:30 h
Spent time:

Description

One of the rules I need for my firewall is to allow established connections from my LAN to my DMZ, but block any newly created connection from my DMZ to my LAN. This is to prevent any potential compromise of my DMZ from spilling over into my LAN.

  • Luckily pfSense can handle this with a simple rule. Start by going to Firewall -> Rules and then select the DMZ tab.
  • Next create a new rule by clicking on [+] and use the following settings.
    • Action: Block
    • Interface: DMZ
    • Protocol: TCP/UDP
    • Source: DMZ net
    • Destination: LAN net
    • Destination Port Range: Any
    • TCP Flags Set: SYN[X]
    • TCP Flags Out Of: SYN[X] ACK[X]

DC Updated by Daniel Curtis over 10 years ago Actions #1

  • Subject changed from DMZ Trap Door Rule to pfSense DMZ Trap Door Rule

DC Updated by Daniel Curtis over 10 years ago Actions #2

  • Description updated (diff)
  • % Done changed from 0 to 50

DC Updated by Daniel Curtis over 10 years ago Actions #3

  • Description updated (diff)

DC Updated by Daniel Curtis over 10 years ago Actions #4

  • Status changed from New to Resolved
  • % Done changed from 50 to 100

DC Updated by Daniel Curtis over 10 years ago Actions #5

  • Status changed from Resolved to Closed
Actions

Also available in: PDF Atom