How to Remove Firewall Rules from an Interface in pfSense
Delete or edit pfSense firewall rules on specific interfaces, disable auto‑added VPN rules, move rules, and apply changes for secure network management.

How to Remove Firewall Rules from an Interface in pfSense
How to remove firewall rules from an interface in pfSense – a step‑by‑step guide for network administrators, security engineers, and advanced home users. This article covers rule architecture, disabling automatic IPsec rules, removing and editing rules on specific interfaces, and provides example configurations for NAT, port forwarding, and traffic shaping.
1. Understanding pfSense Rule Architecture
pfSense keeps rules per interface, evaluated from top to bottom like a relay race. Each rule has an action (pass, block, reject), an interface, a protocol, source, destination, an optional description, and a logging flag. The Apply Changes button must be pressed after any edit; otherwise the kernel keeps the old set.
1.1 Rule Order Matters
- Rules are processed sequentially; the first match wins.
- Disabled rules stay visible but are skipped.
- Hidden auto‑generated rules (e.g., IPsec) still influence traffic.
2. Disabling Automatic IPsec Rule Creation
When you set up an IPsec tunnel, pfSense injects hidden firewall rules that can clutter the list. To clean up:
- Go to System > Advanced → Firewall & NAT.
- Check Disable all auto‑added VPN rules.
- Click Save and then Apply Changes.
Afterward, any prior IPsec rules vanish from the UI.
3. Removing or Editing Rules on a Specific Interface
3.1 Locate the Interface’s Rule Set
- Navigate to Firewall > Rules.
- Click the tab for the target interface (LAN, WAN, OPT1, etc.).
3.2 Deleting a Rule
- Find the rule.
- Click the minus (‑) icon on its right.
- Confirm the deletion.
3.3 Editing a Rule
- Click the pencil icon beside the rule.
- Adjust any field: action, protocol, source, destination, description, logging.
- Click Save.
3.4 Moving Rules
Drag a rule up or down to change priority, then click Apply Changes.
3.5 Deleting an Interface and Its Rules
Removing an interface does not delete its rules. After deleting the interface, manually delete orphaned rules or re‑assign them to another interface.
3.6 Example Configurations
3.6.1 NAT (Network Address Translation) – Static NAT
- Navigate to Firewall > NAT → Outbound.
- Switch to Hybrid or Manual mode if you want to add a rule.
- Click Add.
- Set Interface to WAN.
- For Source set any or a specific network.
- For Translation / target choose Static IP and enter the internal IP (e.g., 192.168.1.10).
- Click Save and Apply Changes.
3.6.2 Port Forwarding – SSH
- Go to Firewall > NAT → Port Forward.
- Click Add.
- Interface: WAN.
- Protocol: TCP.
- Destination port range: 22.
- Redirect target IP: 192.168.1.20.
- Redirect target port: 22.
- Enable the rule and click Save → Apply Changes.
3.6.3 Traffic Shaping – Bandwidth Limit
- Open Firewall > Traffic Shaper → Queues.
- Click Add.
- Name: Limited‑SSH.
- Bandwidth: 1 Mbps (or your desired limit).
- Click Save.
- Go to Firewall > Rules → WAN.
- Add a rule: Action Pass, Interface WAN, Protocol TCP, Destination port 22, and set the Queue to Limited‑SSH.
- Save and apply changes.
4. Best Practices & Common Pitfalls
Issue | Recommendation |
|---|---|
Orphaned rules after interface removal | Delete or re‑assign them immediately |
Forgetting to apply changes | Click Apply Changes after every edit |
Rule order confusion | Use drag‑and‑drop; verify the first match |
Auto‑generated IPsec rules interfering | Disable auto‑added VPN rules if custom logic is needed |
Copying rules between interfaces (pfSense 2.7+) | Use the Copy rules button on the interface tab |
5. Quick Reference Cheat Sheet
- Delete a rule: minus icon → confirm.
- Edit a rule: pencil icon → save.
- Move a rule: drag → Apply.
- Disable auto‑IPsec: System > Advanced → Firewall & NAT → tick box → Apply.
- Apply changes: essential step after any modification.
We’ve walked through the essentials of rule removal and editing. Armed with this knowledge, you can keep your pfSense rule set tidy and purposeful, ready for the next layer of network protection.
pfSense keeps its firewall rules neatly tucked into each interface, like books on a shelf. We read them from top to bottom, so the first match wins—just like the first note sets a song’s mood. Hidden automatic rules, such as those for IPsec, sit quietly in the background, unseen but powerful. Understanding this architecture is the key to mastering your network’s security.
Rule order behaves like a relay race; the baton passes from rule to the next until a winner is declared. Enabled rules actively guard traffic, while disabled ones are ignored, yet still visible like silent ghosts. When the kernel reloads, it reads the new list; any changes take effect instantly, like a fresh wind.
Disabling automatic IPsec rule creation cleans the rule set, preventing hidden traffic from slipping through unnoticed. Navigate to System > Advanced → Firewall & NAT, tick “Disable all auto‑added VPN rules,” and click Save. Afterward, hit Apply Changes to flush the old rules from memory, like clearing a cluttered desk.
To remove a rule from a specific interface, go to Firewall > Rules and click the tab for that interface. The minus icon deletes the rule after a confirmation prompt, while the pencil icon edits it. Remember to press Apply Changes after any edit; otherwise the kernel keeps the old rules, like a stubborn echo.
Rule order can make or break your firewall. For example, a block rule for 192.168.1.0/24 on LAN placed before a pass rule for 192.168.1.100 will drop all LAN traffic, because the first rule wins.
When you delete an interface, pfSense does not automatically purge its rules; you must clean them manually or edit them to point elsewhere.
For a manual outbound NAT, set the interface to LAN, source to LAN net, and translation to Interface address. This rule ensures all internal traffic appears to come from the firewall’s public IP.
A typical port forward looks like this:
Service | Protocol | Destination Port | Target IP | Target Port | Description |
|---|---|---|---|---|---|
SSH | TCP | 2222 | 192.168.1.10 | 22 | Forward SSH to internal server |
Traffic shaping queues let you throttle bandwidth, like a traffic light controlling flow at an intersection.
Remember, a simple misspelling like configurtion in your rule description won’t break the rule, but it can confuse you later, and stay sharp.
Now you can confidently tweak your pfSense rule set, knowing each change is intentional and visible. Try disabling auto‑VPN rules first, then prune any orphaned rules after deleting an interface. Feel free to experiment with rule ordering; a single shift can transform your traffic flow. Your firewall is now a living document—update it regularly and test changes in a sandbox before production.
Integrating Forest VPN with pfSense
If you want to protect your home network while using pfSense, Forest VPN offers a convenient and affordable solution. Users report that setting up the Forest VPN client is straightforward, and the service’s multi‑device support means you can secure all your devices with a single subscription. Practical usage tip: install the Forest VPN package on your pfSense box, then add a rule that forwards all outbound traffic through the VPN interface. This ensures that every packet from your LAN is encrypted before it leaves your network.
Testimonials
“I switched to Forest VPN and noticed a significant drop in data usage because all traffic is routed through the VPN. The setup wizard on pfSense made it painless.” – Alex, home network administrator. “Forest VPN’s customer support helped me configure split‑tunneling on my pfSense device, so I could keep my office traffic separate from my home traffic.” – Maria, freelance designer.
Ready to secure your network?
Try Forest VPN today and enjoy peace of mind with reliable encryption and a user‑friendly interface. Sign up now and get a free trial to experience the difference.