@johnpoz
why do you have that 169.254 address rule
because I noticed that sometimes, even given DHCP availability, that emergency procedure is used
Your rule 192.168.2.2 to 192.168/16 would block and not log any broadcast traffic to 192.168.2.25
I want to assure that the WIFI-repeaters from my networks do not communicate via the WIFI
Then the next 3 rules pretty meaning really. No hits on them, not sure what trickyports are - but no hits. But unless you have UPnP enabled on pfsense, that would never be allowed anyway.
I disabled Upnp, the idea that a computer is allowed to open FW-ports ..... never
Tricky ports is a collection of ports which should never be allowed telnet ..... RPC, netbios etc
That blocking multicast dns - you understand that would only be to pfsense.. A device on that network can still talk to every other device on that network and discover
yep and no. It is only the guest lan and even not that, since the guest network is largely configured as a private lan
Your use of bang rules is would would be causing you to see broadcast from other than 192.168.2.2 which your not logging
I do not understand this. Note that 192.168.2.2 is the WIFI Access-point
If you just had a block rule above those that blocked access to rfc1918 space and you didn't log it. And then a allow rule any for internet, you wouldn't be seeing the broadcast noise.
I fix that at the end
Why do you have source as any?
because
LAN-net is not working for IPV6 (I disabled the rule)
and I do filter <> LAN-net as one of the first rules (for IPV4)
also not that it is extra security, but normally spoken other addresses than lan-net should not / can not occur