• 0 Votes
    21 Posts
    1k Views
    johnpozJ
    @rasputinthegreatest normally hosting stuff on big cdn networks is not cheap - and would assume they do some vetting of what is being hosted/served. Not saying stuff can not be compromised - but seems unlikely some malware people would choose to host their crap there to be honest. While that cdn is not a global player to the likes of aws/azure or clouldflare, etc. They are not a ma and pop vps hoster ;) Glad you got it figured out - and this thread might be very helpful for the next guy.
  • Cisco VTP and PFSense ACL

    1
    0 Votes
    1 Posts
    135 Views
    No one has replied
  • Inter VLAN Access

    6
    2
    0 Votes
    6 Posts
    548 Views
    O
    @Gertjan I figured it out. It was my old IPSEC tunnel. It was capturing the traffic, so the rules never really impacted the traffic. Once I removed the IPSEC tunnel, the rules started working, as mentioned.
  • Direction in firewall states: CLOSED:SYN_SENT

    1
    0 Votes
    1 Posts
    164 Views
    No one has replied
  • 0 Votes
    7 Posts
    454 Views
    E
    @viragomann Yes, actually, I made Allow any to any rules for all interface including bridge interfaces for testing. I wanted to see traffics going right direction and compare what I expected. However, after I provides IP address to bridge, I'm getting less information from firewall. From the firewall state, (PC-B to PC-A) [Any 10.10.40.4 -> 10.10.30.3 SYN_SENT:ESTABLISH] BRG2 10.10.40.4 -> 10.10.30.3 SYN_SENT:ESTABLISH BRG1 10.10.40.4 -> 10.10.30.3 SYN_SENT:ESTABLISH However, I found two solutions. Creating rules in floating tab with enabling quick Make BRG1, BRG2 as a one interface group and creating rule. I have no idea why those can be the solutions but seems like there's something related rule priority. Thank you for taking care of my issue.
  • pfsense seems to be blocking out access to a banking site

    8
    10
    0 Votes
    8 Posts
    477 Views
    C
    @johnpoz Many thanks for the help, advise and comments noted. Thanks again. CC
  • Configuration while on running pfSense

    2
    0 Votes
    2 Posts
    208 Views
    L
    @chris-doldolia Hello! You can safely make configuration changes on a running pfSense firewall, it's designed for that. Most settings apply immediately without needing a reboot, though some services (like IPsec, OpenVPN, or interface changes) may briefly interrupt traffic when restarted. Just make sure you have console or alternate access in case something goes wrong.
  • netcts.cdn-apple.com

    4
    0 Votes
    4 Posts
    582 Views
    JonathanLeeJ
    @johnpoz I am glad you also noticed it, I see it a lot on my proxy I decided to block it and see what breaks but nothing changed so far. I also have the DNS manually set on the iMac, so it should not attempt to use DoH
  • Broken website..?

    4
    1
    0 Votes
    4 Posts
    371 Views
    E
    @Gertjan @JonathanLee , I appreciate your comments and your time for this. I found that our ISP modem keeps sending login page when it thinks connection state is not made properly. (From development tool, I was able to see '302 Found - too many redirects') The issue of this was NAT, because when my IP NATing to interface IP, source port kept changing as well. I have created NAT rule with static port enabling, and it resolved my issue. Thank you very much.
  • multicast 224.0.0.22 incorrectly flagged by !RFC1918 alias

    4
    4
    0 Votes
    4 Posts
    353 Views
    keyserK
    @CatSpecial202 The traffic is not being blocked because it is considered part of the RFC1918 space. Your rule is not a block rule, but rather a PASS rule (!RFC1918). The traffic is blocked by your rule though - but thats because the IGMP multicast packets that was intended to be passed by the rule has IP options enabled that the default IP options filtering in the rule denies. Hence it blocks the traffic. Seach for IGMP filtering blocks traffic on this forum to understand the problem and configure your rule accordingly. Fx: this thread https://forum.netgate.com/topic/187896/how-to-stop-logging-blocked-lan-igmp
  • Sevire issues related to IGMP multicast traffic

    1
    0 Votes
    1 Posts
    145 Views
    No one has replied
  • How to block YouTube in PFSense

    27
    0 Votes
    27 Posts
    89k Views
    J
    Remove potential filter apk
  • Rule Skipping ?...

    3
    1
    0 Votes
    3 Posts
    361 Views
    N
    @KOM Many Thanks for the reply ! ...good to know...
  • Firewall Logs with Protocol = Fragment

    5
    1
    0 Votes
    5 Posts
    546 Views
    johnpozJ
    @CZvacko to be honest have no idea what would cause that.. But I don't have anything on my network doing ws-discovery either (ssdp).. At least not to ipv6 multicast..
  • Unable to Ping Gateway From inside its own VLAN.

    11
    4
    0 Votes
    11 Posts
    964 Views
    N
    It appears after more digging I found my fix. Sort of my fault In a way. I noticed in the command above that my rules that were being applied from the webgui were not showing on the backend rules. After scratching my a head a while, I looked at pfblockerng and noticed it was creating a lot of table IP entries and erroring due to limit. I did enable Geo and IP blocking which would created massive lists and due to this getting stuck it wouldn't write my firewall changes down. So I have adjusted the list limit and audited the IP lists I have enabled, and my rules are now showing.
  • Blocking an external ip

    1
    1
    0 Votes
    1 Posts
    187 Views
    No one has replied
  • Default Deny Rule blocking traffic between interfaces

    16
    3
    0 Votes
    16 Posts
    2k Views
    johnpozJ
    @Spiney ip options is not his issue that is for sure.
  • Adding a large list as an alias under "URL Table (IPs)" fails.

    9
    5
    0 Votes
    9 Posts
    1k Views
    S
    @johnpoz I think I know why it fails. Once again, I realized that a software man cannot afford to be lazy. I scanned the entries, and realised (to my amazement) that there are many invalid entries, i.e. ones that contain characters that cannot exist in a domain name, the most common one being the humble "/" (slash). It appears someone did a sloppy job there. "Mystery solved, I guess; right?" (https://www.youtube.com/watch?v=dDmqOott-_4)
  • How to see numbers of CPU cycles for particular FW rule?

    2
    0 Votes
    2 Posts
    412 Views
    M
    @Sergei_Shablovsky You're absolutely right: profiling firewall rules by CPU cycles and traffic impact can help drastically optimize a pfSense firewall ruleset. However, pfSense (based on pf from OpenBSD) does not natively provide per-rule CPU cycle measurements, unlike ipfw which does have more granular counters and optional DTrace integration on FreeBSD. Let's break it down and explore both what is and what could be done: What You Can Do on pfSense Today: 1. Monitor Per-Rule Packet/Byte Counters, Each firewall rule in pf already tracks: Number of packets matched Number of bytes matched You can see this via: pfSense GUI: Go to Diagnostics → pfTop, then choose rules or rules (bytes) views. CLI using pfctl: pfctl -vvsr This will output per-rule stats like: @1 pass in quick on em0 proto tcp from any to any port = 22 flags S/SA keep state (if-bound) [ Evaluations: 1000000 Packets: 123456 Bytes: 12345678 States: 5 ] 2. Estimate Rule Cost Using Hit Rate and Rule Order pf processes rules top-down. A rule near the bottom of a large list with lots of matches is inefficient. So: Reorder rules with higher hit counts closer to the top Eliminate or merge redundant rules What You Cannot Do (Yet) on pfSense No Native CPU Cycle Measurement Per Rule Unlike ipfw, pf does not profile CPU cycles per rule. Reasons: pf is a stateless rule matcher with fast path optimizations; its kernel code isn't instrumented for CPU-time profiling. pf focuses on packet path and counters, not runtime cost metrics. Alternatives and Advanced Workarounds Option 1: Use DTrace (FreeBSD only, not available on pfSense CE/Plus) If you're on vanilla FreeBSD (not pfSense), you can: Enable DTrace Hook into pf_test() or pf_check_in() functions Measure time spent per rule using custom probes Sample DTrace snippet (illustrative only): pf:rule:match { self->ts = timestamp; } pf:rule:exit /self->ts/ { @time[rule_id] = quantize(timestamp - self->ts); self->ts = 0; } But again: this is NOT available on pfSense directly. You’d need a custom build. Option 2: Mirror and Benchmark in IPFW (Test Rig) If optimization is critical: Export the same ruleset to a test VM running FreeBSD + IPFW Use ipfw's net.inet.ip.fw.enable=1 and enable per-rule accounting: sysctl net.inet.ip.fw.verbose=1 ipfw -a list Simulate traffic and observe both match counts and CPU impact (possible with DTrace). Suggested Metrics for Rule Profiling Metric-------------How to Get-----------Use for Optimization Packets per rule----pfctl -vvsr-----------Prioritize high-hit rules Bytes per rule------pfctl -vvsr-----------Identify bandwidth-heavy rules Rule evaluation order----Rule position in pf.conf---Push common rules up State counts-------pfctl -ss-----------wc -l CPU usage (global)-------top / systat -vmstat--------Coarse measure of FW CPU impact
  • Lot of IGMP blocked in Firewall log

    2
    2
    0 Votes
    2 Posts
    375 Views
    GertjanG
    @bchan said in Lot of IGMP blocked in Firewall log: IGMP Read https://forum.netgate.com/topic/197149/new-pfsense-plus-25-03-beta-is-here/37?_=1749016620666 - the IGMP issue should have been solved in 2.8.0 as it's known now for a while now, and a solution was posted for 2.9.0 or whatever the future brings us. The good news : throw IGMP in the forum search box, and you'll find how out to stop the IGMP logging.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.