[Last Call] Learn how to a build a cloud-first strategyRegister Now


Need help with configuring pfsense to block traffic and limit users on network

Posted on 2014-08-18
Medium Priority
Last Modified: 2014-12-26
Hello Experts,

Recently got a pfsense installed on our network, and need help with getting it setup to block some IP addresses and limit bandwidth to encourage fair usage.  Where would I go to set this up, under firewall menu..need some help.

Best regards
Question by:kasondeneddy
  • 3
  • 2
LVL 25

Accepted Solution

Zephyr ICT earned 1000 total points
ID: 40267368
To block some IP's I'd take a look at the available packages on your pfsense device, there should be a package called pfBlocker, which allows to set aliases for multiple ip's and even countries... That will help in blocking IP-addresses... If that is what you mean. Maybe Squid Proxy is also interesting for your network, can speed things up if your users visit the same sites a lot...

To limit bandwidth, you'll need to look at Traffic Shaper (under Firewall menu), there's a wizard you can use, check this website to guide you through the setup.

Author Comment

ID: 40267814
Hi thanks for the response, where would I find the pfblocker?  under what menu... will go through the wizard on bandwidth limiting shortly..thanks again for response
LVL 25

Expert Comment

by:Zephyr ICT
ID: 40267829
You can find the packages under System > Packages > Available Packages.
Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

LVL 14

Assisted Solution

by:Natty Greg
Natty Greg earned 1000 total points
ID: 40271658

Author Comment

ID: 40284926
Hi guys,

Thanks for this.  Been away from work but I am back.  I will do the necessary soon and post back how things go a bit later in the day when I am at site.


Author Closing Comment

ID: 40518389
Lead in the right direction....

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question