Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TCP:PA FA and FPA in logs

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 5 Posters 995 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      Paddy @johnpoz
      last edited by

      @johnpoz said in TCP:PA FA and FPA in logs:

      At a loss to why you think you needed to hide some 10.x.x.x address.

      Those are on your vpn interface and in the outbound direction? Those little black arrowheads are outbound I thought - but why is the rule saying its the default deny in an outbound direction?

      So details of your setup and how your using the vpnserver interface (the s1) etc.. would be helpful.

      Just force of habit - I know they are non routable on the internet.

      I don't know what the arrow head means but the source are external and the destination are IP's assigned to our OpenVPN clients.

      The pfSense is hosted at AWS. Straight forward setup. LAN and WAN interfaces. The OpenVPN is running on the WAN interface.

      All workers traffic is routed through the OpenVPN so even their no work related browsing is via the pfSense

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @Paddy
        last edited by

        @paddy said in TCP:PA FA and FPA in logs:

        the arrow head means

        The arrow head means outbound

        https://docs.netgate.com/pfsense/en/latest/monitoring/logs/firewall.html

        outbound.jpg

        What rules do you have in floating - not possible to see that little black arrow unless you create rules in the floating tab, interface rules are only evaluated inbound, not outbound.. Only way to get an outbound block is in the floating tab..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        P 1 Reply Last reply Reply Quote 0
        • P
          Paddy @johnpoz
          last edited by

          @johnpoz

          No floating rules defined.
          Screenshot 2022-01-27 165801.png

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @Paddy
            last edited by johnpoz

            @paddy well then I have no idea what is going on there.. I am not aware of any other way for outbound rules to be evaluated.. And to be honest something odd even if a floating rule since it says the default deny rule in outbound direction?

            Lets see if @Derelict or @stephenw10 want to chime in with some wisdom.. Since I'm just drawing a blank to what could cause that..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            DerelictD 1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate @johnpoz
              last edited by

              Probably no different than any other asymmetric situation. Inbound on one interface with the reply traffic going out another with no state.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @Derelict
                last edited by

                @derelict huh? Just on first cup of coffee, but in what scenario would outbound traffic be evaluated by rule in outbound direction without a floating rule to do that? I thought only floating rules did outbound evaluation? There is default deny for outbound?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                DerelictD 1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate @johnpoz
                  last edited by Derelict

                  @johnpoz routing into an interface without reply-to and the reply traffic following the routing table. It's obviously something. Look at the states for the interesting traffic:

                  pfctl -vvvss | grep -A4 _something_interesting_

                  Get the rule number then look at the rule set to see what rule allowed the SYN in and created the inbound state.

                  Either the ovpnc1 interface didn't see the TCP handshake or the state has been expired/killed.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • ?
                    A Former User @Paddy
                    last edited by

                    @paddy said in TCP:PA FA and FPA in logs:

                    what I can do to remove them?

                    5aac199a-fbb9-4d8a-8c22-4f464b121438-image.png

                    configure the same as me and this will no longer be displayed ... You also do not have to worry I see this every time and everything works fine

                    1 Reply Last reply Reply Quote 1
                    • P
                      Paddy
                      last edited by

                      Thanks guys for taking the time to explain and showing how to hide them.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @Derelict
                        last edited by

                        @derelict said in TCP:PA FA and FPA in logs:

                        Either the ovpnc1 interface didn't see the TCP handshake or the state has been expired/killed.

                        Yeah I get that - but there is an outbound default deny?

                        Well guess there is ;)

                        [21.05.2-RELEASE][admin@sg4860.local.lan]/root: pfctl -sr | grep "Default deny rule IPv4"
                        block drop in inet all label "Default deny rule IPv4"
                        block drop out inet all label "Default deny rule IPv4"
                        

                        Ok that makes more sense now.. Thanks @Derelict

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        DerelictD 1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate @johnpoz
                          last edited by

                          @johnpoz I am going to submit a redmine to put "inbound/outbound" in those rule labels.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.