To begin, we will configure the IP address of the pfSense LAN interface.
To do this, choose the "2) Set interface(s) IP address" option from this menu.
Choose the LAN interface by typing the number 2.
Plain Text
Available interfaces: 1 - WAN (vmx0 - dhcp, dhcp6) 2 - LAN (vmx1 - static) Enter the number of the interface you wish to configure: 2
Specify the static LAN IP address to set for pfSense.
In our case, we will use the LAN IP address "10.0.0.1" (which is an IP address used by default for routers on a 10.x.x.x network).
Warning : it is important that the pfSense DHCP server does not distribute this IP address so as not to create an IP address conflict on this LAN network.
Hence it is also useful to use the 1st digit or the last possible digit for this subnet.
Plain Text
Enter the new LAN IPv4 address. Press <ENTER> for none: > 10.0.0.1
Indicate the subnet mask to use (in CIDR notation) whose current values are shown below.
Common examples: 2555.255.255.0 (24) for the 192.168.1.x network or 2555.0.0.0 (8) for the 10.x.x.x network.
Plain Text
Subnet masks are entered as bit counts (as in CIDR notation) in pfSense. e.g. 255.255.255.0 = 24 255.255.0.0 = 16 255.0.0.0 = 8 Enter the new LAN IPv4 subnet bit count (1 to 32): > 8
As indicated by pfSense, for the LAN network, this value should be left empty.
So just press Enter.
In our case, we will not use IPv6
So just press Enter.
Plain Text
Enter the new LAN IPv6 address. Press <ENTER> for none: >
Enable the pfSense DHCP server so that it can distribute IP addresses on the LAN network.
To do this, answer "y" to the question "Do you want to enable the DHCP server on LAN? (y/n)".
Next, define an IP address range that pfSense can distribute, but avoid creating too large a range to avoid a bug.
In our case, we set the IP address range "10.0.0.10" to "10.0.0.254" to be able to set static IP addresses on servers (between 10.0.0.2 and 10.0.0.9 inclusive) and not create new ones. conflict with broadcast address ending with ".255".
Plain Text
Enter the start address of the IPv4 client address range: 10.0.0.10 Enter the end address of the IPv4 client address range: 10.0.0.254 Disabling IPv6 DHCPD...
pfSense will then ask you if you want to reactivate HTTP access to your web interface (if you answer "y") or if you want to keep HTTPS-only access (if you answer "n") to it.
In our case, we answered "n".
Note: reactivating HTTP access for the web interface is only useful if the HTTPS version no longer works (because of a configuration problem with the certificates used, for example).
Source : Do you want to revert to HTTP as the webconfigurator protocol? y/n | Netgate Forum.
Plain Text
Do you want to revert to HTTP as the webConfigurator protocol? (y/n) n
The address of the pfSense web interface appears.
Press Enter.
Plain Text
Please wait while the changes are saved to LAN... Reload filter... Reloading routing configuration... DHCPD... The IPv4 LAN address has been set to 10.0.0.1/8 You can now access the webConfigurator by opening the following URL in your web browser: https://10.0.0.1/ Press <ENTER> to continue.
As you can see, the IP address of the LAN interface has been changed.
Note that, by default, the pfSense web interface is only accessible from the LAN interface and not from the WAN interface for security reasons.
Which corresponds to the behavior of a usual router.
To configure the pfSense WAN IP address, use the "2) Set interface(s) IP address" option again.
However, this time, specify 1 to select the WAN interface.
To prevent pfSense from changing its IP address on the WAN network, we will define a static IP address for it.
To do this, answer "n" to the question below.
Plain Text
Configure IPv4 address WAN interface via DHCP? (y/n) n
Specify the WAN IP address to use for pfSense.
In our case "192.168.1.10", because the router of our physical network has the IP address "192.168.1.1".
Select the corresponding subnet by specifying its CIDR notation.
So in our case, 24 to use the subnet mask "255.255.255.0" (which corresponds to the network "192.168.1.x").
For the WAN network, provide the IP address of the parent router if there is one.
In our case, the router of our physical network has the IP address "192.168.1.1".
In general, this is the IP address of your Box (provided by your ISP).
Plain Text
For a WAN, enter the new WAN IPv4 upstream gateway address. For a LAN, press <ENTER> for none: > 192.168.1.1
As said before, in our case we will not use IPv6, so answer "n" to the question below to disable obtaining an IPv6 address from the DHCPv6 server (if applicable) of the parent network for the pfSense WAN interface.
Plain Text
Configure IPv6 address WAN interface via DHCP6? (y/n) n
Since you refuse to automatically obtain an IPv6 address from the parent network's DHCPv6 server, pfSense offers to define it manually.
Leave blank and just press Enter to disable IPv6.
Plain Text
Enter the new WAN IPv6 address. Press <ENTER> for none: > Disabling IPv4 DHCPD... Disabling IPv6 DHCPD...
Again, pfSense asks you if you want to restore HTTP access for its web interface.
Preferably, answer "n" for security reasons.
The new pfSense WAN IP address appears.
Press Enter to return to the main menu.
Plain Text
Please wait while the changes are saved to WAN... Reloading filter... Reloading routing configuration... DHCPD... The IPv4 WAN address has been set to 192.168.1.10/24. Press <ENTER> to continue.
The WAN IP address has been changed and the IPv6 address has disappeared (if applicable) since we have not configured IPv6.
For this tutorial, we installed a new virtual machine under Windows 10.
To connect this virtual machine to the pfSense LAN network, go to its settings by clicking on "Edit virtual machine settings" (if it is turned off).
Otherwise, go through the "VM -> Settings" menu.
Next, select the virtual network adapter (Network Adapter) of this virtual machine and select the "Custom: pfSense LAN" network.
At the moment, your client VM (in our case, our Windows 10 VM) may not have access to the Internet at the moment.
From this client machine, access the pfSense web interface using the pfSense LAN IP address.
Which gives in our case: "https://10.0.0.1/".
As with any web interface using the HTTPS protocol, by default a self-signed certificate is used.
Hence the display of this security warning.
Skip it to access the pfSense web interface.
Log in as admin with the default pfSense credentials: admin / pfsense.
Source : Default Username and Password | pfSense Documentation.
When you access the pfSense web interface for the first time, a "pfSense Setup" configuration wizard will appear.
Click Next.
As you can see in step "1. Netgate Global Support is available 24/7", Netgate offers paid 24/7 support for pfSense if you want it.
But this requires a subscription plan that matches the size and requirements of your environment.
In step "2. General Information", you can configure:
Warning : by default, the pfSense DNS resolver will ignore the DNS servers configured here for requests from client PCs.
In other words, by default, only your pfSense virtual machine will use these DNS servers.
If you want clients to also use these DNS servers, you will need to enable DNS query redirection via the "Services -> DNS Resolver" menu.
In step "3. Time Server Information", you can configure:
In step "4. Configure WAN Interface", you can configure:
If you selected "Static" for the WAN interface type (at the top of the page), you will be able to define a static IP address for the pfSense WAN interface in the "Static IP Configuration" section.
Although we have already done it from the pfSense console, in our case.
If you selected "DHCP" for the WAN interface type, you will be able to configure the DHCP option available in the "DHCP client configuration" section.
This value of this "DHCP Hostname" option will be sent with the DHCP request and is requested by some ISPs.
If you selected "PPPoE" for the WAN interface type, you will be able to specify the PPPoE settings for your Internet connection in the "PPPoE Configuration" section.
Note: these PPPoE settings are provided by your ISP.
If you selected "PPTP" for the WAN interface type, you will be able to specify the PPTP settings for your Internet connection in the "PPTP Configuration" section.
Important : as stated in the official pfSense documentation, this only allows you to connect to the Internet using the PPTP settings provided by your ISP.
This does not allow you to connect to a VPN server using the PPTP protocol.
At the bottom of the page, you will find 2 options to block different network types:
Source : Rule Methodology - Block Bogon Networks | pfSense Documentation.
Then, in step "5. Configure LAN Interface", you can configure the LAN interface of pfSense.
As you can see from the beginning at the top of the page, pfSense tells you that the password for the "admin" account is still the default and it invites you to change it.
Which is highly recommended.
In step "6. Set Admin WebGUI Password", you can configure change the password of this "admin" account:
As pfSense tells you, this "admin" account can be used to connect to the pfSense web interface, but also via SSH (if this service is activated in the pfSense configuration).
In step "7. Reload configuration", click on "Reload" so that the new configuration is used by pfSense.
In step "8. Reload in progress", simply wait while the new configuration is applied.
Once the pfSense configuration has been updated, step "9. Wizard completed" will appear with the message "Congratulations! pfSense is now configured".
For more information regarding the pfSense configuration steps you just saw, refer to the page : Setup Wizard | pfSense Documentation.
Accept the notice that appears.
Click Close.
Then, the pfSense dashboard will appear with system information in the "System Information" section:
In the "Interfaces" section, you will find the list of pfSense interfaces:
Firewall 5/17/2025
Firewall 5/15/2025
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment