TSF – Giải pháp IT toàn diện cho doanh nghiệp SMB | HCM

P4 - Critical Guide: Change Port pfSense Securely

pfSense – P4 Secure pfSense WebGUI: Change Port and Enable HTTPS

Securing the pfSense WebGUI is one of the most important hardening steps after initial installation. Leaving the default HTTP configuration and standard ports can expose your firewall management interface to unnecessary risk.

In this tutorial, you will learn how to:

  1. Enable HTTPS (required)

  2. Change WebGUI port

  3. Change LAN IP of pfSense

By completing these steps, you significantly improve administrative security and reduce attack surface exposure.

This guide focuses on properly securing access and how to Change Port pfSense safely without breaking connectivity.


🔹 1. Enable HTTPS (Required)

First, you must enable secure access to the WebGUI.

Navigate to:

System → Advanced → Admin Access

Tick:

☑️ Enable HTTPS

Then configure:

WebGUI Redirect → HTTP to HTTPS

It is strongly recommended to enable HTTPS redirection. This ensures that any attempt to access the WebGUI via HTTP will automatically redirect to a secure HTTPS session.


🔎 Why HTTPS Is Mandatory

Using HTTP (port 80) exposes credentials in plain text. Enabling HTTPS provides:

  • Encrypted administrator login

  • Protection against packet sniffing

  • Secure session management

  • Improved overall firewall security

After enabling HTTPS and saving changes, the system will reload the WebGUI using secure protocol.

Always verify that you can reconnect successfully after applying settings.


🔹 2. Change Web GUI Port

After enabling HTTPS, the next step is to change the default WebGUI port.

Go to:

System → Advanced → Admin Access

Locate the section:

TCP Port

Default values:

  • 80 (HTTP)

  • 443 (HTTPS, if enabled)

You can change it to:

  • 8443

  • 10443

  • 9443

Changing the default port adds another layer of security by reducing exposure to automated scanning attacks.


⚠ Important After Saving

After saving the new port configuration, you must access the WebGUI using the new port.

Example:

 
https://192.168.16.2:9443
 

If you forget to include the new port number, the browser will not connect correctly.

Always confirm:

  • Firewall rules allow management access

  • You are accessing the correct IP

  • The new port is properly specified

Changing the port is a small but effective security enhancement when you Change Port pfSense management interface.


🔹 3. Change IP LAN PfSense

To further customize your network configuration, you can change the LAN IP address.

Change IP:

192.168.16.1

Adjusting the LAN IP may be necessary when:

  • Aligning with existing network design

  • Avoiding IP conflicts

  • Standardizing gateway addressing

After changing the LAN IP:

  • Renew DHCP leases on client devices

  • Reconnect using the new IP address

  • Verify gateway and DNS functionality

Failing to update client settings may temporarily disconnect management access.


🔐 Security Best Practices After Configuration

Once you enable HTTPS and Change Port pfSense WebGUI:

  • Disable HTTP completely if not required

  • Use strong admin passwords

  • Consider limiting GUI access to specific IP ranges

  • Backup configuration after successful changes

Layered security is essential for firewall management interfaces.


🚀 Why Changing Port and Enabling HTTPS Matters

Securing the WebGUI reduces:

  • Brute-force attempts

  • Automated port scanning exposure

  • Credential interception risks

  • Unauthorized administrative access

Although changing the port is not a replacement for proper firewall rules, it significantly decreases attack visibility.

Combined with HTTPS, it creates a more secure administrative environment.


🏁 Conclusion

Hardening the firewall management interface should be one of your first post-installation tasks.

By following this structured approach:

  1. Enable HTTPS

  2. Redirect HTTP to HTTPS

  3. Change default WebGUI port

  4. Adjust LAN IP if necessary

You create a safer and more professional pfSense deployment.

This completes Part 4 of the pfSense series and prepares your firewall for advanced configuration such as firewall rules, NAT policies, VPN setup, and traffic segmentation.

See also related articles

P16 – VLANs on pfSense Made Easy: UniFi Setup Guide

P16 – VLANs on pfSense Made Easy: UniFi Setup Guide https://youtu.be/ep78Pokpvqc 🚀 Configure VLANs on pfSense for UniFi Network (Beginner Guide) Segmenting your network using VLANs is a fundamental practice in modern IT systems. It improves security, performance, and manageability—especially when deploying wireless networks like UniFi. In this guide, you...

Read More

P15 – VoIP on pfSense Made Easy: QoS Priority Setup

Pfsense – P15 Configure QoS for VoIP on pfSense (IP Phone Priority Setup) https://youtu.be/ZAok_lCChjU 🚀 Configure QoS for VoIP on pfSense (IP Phone Priority Setup) In modern business environments, voice and video communication are critical. Without proper traffic control, applications like VoIP, Microsoft Teams, or Zoom can easily suffer from...

Read More

P14 – Upgrade pfSense Safely: 2.7 to 2.8 Guide

P14 – Upgrade pfSense Safely: 2.7 to 2.8 Guide https://youtu.be/r_8iU6MC0Bs 🚀 Upgrade pfSense 2.7 to 2.8 – Full Tutorial for Beginners Upgrading pfSense to a newer version is essential to maintain security, performance, and compatibility with modern network environments. In this guide, you’ll learn how to upgrade pfSense from version...

Read More