Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TCP:PA FA and FPA in logs

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 5 Posters 996 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @bingo600
      last edited by

      At a loss to why you think you needed to hide some 10.x.x.x address.

      Those are on your vpn interface and in the outbound direction? Those little black arrowheads are outbound I thought - but why is the rule saying its the default deny in an outbound direction?

      So details of your setup and how your using the vpnserver interface (the s1) etc.. would be helpful.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      P 1 Reply Last reply Reply Quote 0
      • P
        Paddy @johnpoz
        last edited by

        @johnpoz said in TCP:PA FA and FPA in logs:

        At a loss to why you think you needed to hide some 10.x.x.x address.

        Those are on your vpn interface and in the outbound direction? Those little black arrowheads are outbound I thought - but why is the rule saying its the default deny in an outbound direction?

        So details of your setup and how your using the vpnserver interface (the s1) etc.. would be helpful.

        Just force of habit - I know they are non routable on the internet.

        I don't know what the arrow head means but the source are external and the destination are IP's assigned to our OpenVPN clients.

        The pfSense is hosted at AWS. Straight forward setup. LAN and WAN interfaces. The OpenVPN is running on the WAN interface.

        All workers traffic is routed through the OpenVPN so even their no work related browsing is via the pfSense

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @Paddy
          last edited by

          @paddy said in TCP:PA FA and FPA in logs:

          the arrow head means

          The arrow head means outbound

          https://docs.netgate.com/pfsense/en/latest/monitoring/logs/firewall.html

          outbound.jpg

          What rules do you have in floating - not possible to see that little black arrow unless you create rules in the floating tab, interface rules are only evaluated inbound, not outbound.. Only way to get an outbound block is in the floating tab..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          P 1 Reply Last reply Reply Quote 0
          • P
            Paddy @johnpoz
            last edited by

            @johnpoz

            No floating rules defined.
            Screenshot 2022-01-27 165801.png

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @Paddy
              last edited by johnpoz

              @paddy well then I have no idea what is going on there.. I am not aware of any other way for outbound rules to be evaluated.. And to be honest something odd even if a floating rule since it says the default deny rule in outbound direction?

              Lets see if @Derelict or @stephenw10 want to chime in with some wisdom.. Since I'm just drawing a blank to what could cause that..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              DerelictD 1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate @johnpoz
                last edited by

                Probably no different than any other asymmetric situation. Inbound on one interface with the reply traffic going out another with no state.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @Derelict
                  last edited by

                  @derelict huh? Just on first cup of coffee, but in what scenario would outbound traffic be evaluated by rule in outbound direction without a floating rule to do that? I thought only floating rules did outbound evaluation? There is default deny for outbound?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  DerelictD 1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate @johnpoz
                    last edited by Derelict

                    @johnpoz routing into an interface without reply-to and the reply traffic following the routing table. It's obviously something. Look at the states for the interesting traffic:

                    pfctl -vvvss | grep -A4 _something_interesting_

                    Get the rule number then look at the rule set to see what rule allowed the SYN in and created the inbound state.

                    Either the ovpnc1 interface didn't see the TCP handshake or the state has been expired/killed.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User @Paddy
                      last edited by

                      @paddy said in TCP:PA FA and FPA in logs:

                      what I can do to remove them?

                      5aac199a-fbb9-4d8a-8c22-4f464b121438-image.png

                      configure the same as me and this will no longer be displayed ... You also do not have to worry I see this every time and everything works fine

                      1 Reply Last reply Reply Quote 1
                      • P
                        Paddy
                        last edited by

                        Thanks guys for taking the time to explain and showing how to hide them.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @Derelict
                          last edited by

                          @derelict said in TCP:PA FA and FPA in logs:

                          Either the ovpnc1 interface didn't see the TCP handshake or the state has been expired/killed.

                          Yeah I get that - but there is an outbound default deny?

                          Well guess there is ;)

                          [21.05.2-RELEASE][admin@sg4860.local.lan]/root: pfctl -sr | grep "Default deny rule IPv4"
                          block drop in inet all label "Default deny rule IPv4"
                          block drop out inet all label "Default deny rule IPv4"
                          

                          Ok that makes more sense now.. Thanks @Derelict

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          DerelictD 1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate @johnpoz
                            last edited by

                            @johnpoz I am going to submit a redmine to put "inbound/outbound" in those rule labels.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.