pfSense – DDoS
PfBlocker
- See 192.168.30.1 (intranet) as an example
- Click System>Packages
- Install PfBlocker
- Click Firewall>PfBlocker>General
- Enable with Defaults
- Click Firewall>PfBlocker>Lists
- Add Spamhaus and/or others
- Full lists options here: https://doc.pfsense.org/index.php/Pfblocker#Available_lists
- Click Firewall>PfBlocker>Top Spammers
- Select appropriate lists
Code Way to do it
This should work for all versions of pfSense:
- Under Diagnostics -> Edit file Browse to /etc open ntpd.conf at the end add:
- restrict -4 default kod notrap nomodify nopeer noquery restrict -6 default kod notrap nomodify nopeer noquery restrict 127.0.0.1 restrict ::1
- save the file, then go back to Diagnostics -> Command Prompt and execute two commands
- killall ntpd service ntpd onestart
- You can test for vulnerable installs from any BSD/Linux/Mac from the terminal with: ntpdc -n -c monlist <ip address>
- You can use pfSense to test other installs by using that command in the Diagnostics Command Prompt :)