Alias Types

The next sections describe the behavior of each alias type in detail. Any type-specific configuration settings are also covered in these sections.

Built-In System Aliases

pfSense® software includes several built-in System Aliases which are accessible to users. These include stock collections of networks and IP addresses as well as automatically generated and/or maintained collections.

These are visible on the All tab under Firewall > Aliases in the System Aliases section.

Note

Some of these System Aliases have multiple variations for IPv4, IPv6, and combined IPv4+IPv6. These are denoted by the number 4, 6 or 46 near the end of the name, respectively. In most cases it is safe to use the IPv4+IPv6 version as the firewall will use whichever address family is appropriate for a rule, but some users may prefer to configure different rules for IPv4 and IPv6.

The current list includes the following entries:

bogons:

Bogon networks.

sshguard:

Hosts blocked by anti-brute-force login protection for SSH and the GUI.

snort2c:

Hosts blocked by IDS/IPS software.

virusprot:

Hosts which tripped firewall rate limit protections in advanced options (e.g. maximum source hosts for a rule).

mim_vpn_port:

Multi-Instance Management VPN port (General Options).

vpn_networks:

Networks for IPsec, OpenVPN, and PPPoE servers.

Note

This may not be complete as it cannot detect networks made available via dynamic routing, pushed routes from OpenVPN, advanced/custom options, etc.

negate_networks:

Networks to exclude from policy routing rules with any destination.

tonatsubnets:

Networks for which the firewall will apply outbound NAT in Automatic and Hybrid modes.

_loopback(4|6|46)_:

Local loopback addresses.

_linklocal(4|6|46)_:

Link-local addresses which must not leave their own network.

_private(4|6|46)_:

“Private” network allocations common for local private networks.

_multicast(4|6|46)_:

Multicast networks.

_reserved(4|6|46)_:

All current known reserved networks.

Host Aliases

Host type aliases contain entries consisting of individual IP addresses or fully qualified domain names (FQDNs).

When creating an alias, users may enter an IP address range such as 192.168.1.1-192.168.1.10 or a small subnet such as 192.168.1.16/28. When saving the alias, the firewall translates that specification into a list of individual IP addresses.

Figure Example Hosts Alias shows an example of a host type alias which contains a list of public web servers.

../_images/firewall-example-hosts-alias.png

Example Hosts Alias

Network Aliases

Network type aliases contain entries consisting of CIDR format networks/prefixes or fully qualified domain names (FQDN) for single addresses.

For subnets, select the CIDR mask that pertains to each entry. /32 specifies a single IPv4 host, /128 specifies a single IPv6 host, /24 specifies 255.255.255.0, /64 specifies a normal IPv6 network, etc.

Hostnames (FQDNs) may also be specified, using a /32 mask for IPv4 or /128 for IPv6. This mask is not applied to addresses returned by DNS.

Figure Example Network Alias shows an example of a network alias.

../_images/management-hosts-alias.png

Example Network Alias

When an alias entry contains an IPv4 range the firewall automatically translates the range to an equivalent set of IPv4 CIDR networks which exactly contain the range. This is shown in Figure Example IP Range After.

../_images/firewall-alias-iprange-example-before.png

Example IP Range Before

../_images/firewall-alias-iprange-example-after.png

Example IP Range After

Port Aliases

Port type aliases contain entries consisting of ports numbers and port ranges. A single port is an integer from 1-65535. A port range is two ports separated by a colon (:), for example, 1194:1199. Port ranges match the specified start and ending port numbers and all ports in between.

Port aliases do not have a direct relationship with any protocol. Firewall rules using a protocol of TCP, UDP, or SCTP may use port aliases to match port numbers for the protocol on the rule.

Figure Example Ports Alias shows an example of a port type alias.

../_images/firewall-example-ports-alias.png

Example Ports Alias

URL Aliases

URL type aliases contain one or more URLs which return a plain text a list of entries.

When creating the alias, the firewall reads up to 3,000 entries from each URL and imports them into an alias.

The exact behavior depends on the type of URL alias:

URL (IPs):

The URLs must contain IP addresses, CIDR masked network entries, or FQDNs. The firewall creates a Network type alias from the content.

URL (Ports):

The URL must contain only port numbers or port ranges. The firewall creates a Port type alias from the content.

URL Table Aliases

URL Table type aliases contain one or more URLs which return a plain text a list of entries, plus an update interval which indicates how frequently the firewall should re-fetch the URL contents.

URL Table type aliases download the content of the URLs into a special location on the firewall, then use that content for a persist table, also known as a file-based alias. The full contents of these alias are not directly editable in the GUI, but the GUI can display the Firewall Table Contents.

The drop-down list after the / in an entry of a URL Table alias controls the number of days after which the firewall re-fetches content from the stored URLs. The firewall checks once per day to determine if URL table aliases need updates.

URL Table aliases can be quite large, containing many thousands of entries. Some customers use them to hold lists of all IP address blocks in a given country or region, which can easily surpass 40,000 entries. The pfBlockerNG package uses this type of alias when handling country lists and other similar actions.

The exact behavior depends on the type of URL alias:

URL Table (IPs):

The URLs must contain IP addresses, CIDR masked network entries, or FQDNs. The firewall creates a Network type alias from the content.

URL Table (Ports):

The URL must contain only port numbers or port ranges. The firewall creates a Port type alias from the content.