@viragomann
I can ping google.com, it works just fine.
Indeed, in the logs there seem to be recurring patterns (and I totally missed the flags).
home_ip : my home public ip address
server_ip : my server public ip address
public_ip : multiple public ip addresses were captured by the filter
port : multiple port numbers were captured by the filter
Here is for the Default deny rule IPv4 :
block em0 TCP:PA home_ip:port server_ip:443 (*)
block em0 ICMP public_ip server_ip
block em0 TCP:S public_ip server_ip:port (mostly port 445)
block em0 TCP:A/FA/PA 192.241.206.128:port server_ip:443(**)
block em0 TCP:R public_ip:port server_ip:80
(*) this line appears so often that it is difficult to see anything else.
(**) I don't know the 192.241.206.128 address, but it is the only one I have with the A, FA and PA flags
Some traffic is passing :
pass em0 TCP:S server_ip:port 99.86.113.21:443
pass em1 TCP:S 192.168.1.2:46178 99.86.113.21:443 (***)
pass em1 TCP:S 192.168.1.101:port 34.122.121.32:80 (32.121.122.34.bc.googleusercontent.com)
(***) 192.168.1.2 is another vm (debian) on the LAN --> no internet as well
In the end, the Default deny rule IPv4 seems to be blocking inbound traffic. I could see that it was mostly blocking ip addresses referenced as abusive.
And I think I have missed something, because I don't see all the LAN activities in the logs (e.g., ping). I am currently working on this issue.