Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TCP:PA FA and FPA in logs

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 5 Posters 995 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @Paddy
      last edited by

      @paddy said in TCP:PA FA and FPA in logs:

      the arrow head means

      The arrow head means outbound

      https://docs.netgate.com/pfsense/en/latest/monitoring/logs/firewall.html

      outbound.jpg

      What rules do you have in floating - not possible to see that little black arrow unless you create rules in the floating tab, interface rules are only evaluated inbound, not outbound.. Only way to get an outbound block is in the floating tab..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      P 1 Reply Last reply Reply Quote 0
      • P
        Paddy @johnpoz
        last edited by

        @johnpoz

        No floating rules defined.
        Screenshot 2022-01-27 165801.png

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @Paddy
          last edited by johnpoz

          @paddy well then I have no idea what is going on there.. I am not aware of any other way for outbound rules to be evaluated.. And to be honest something odd even if a floating rule since it says the default deny rule in outbound direction?

          Lets see if @Derelict or @stephenw10 want to chime in with some wisdom.. Since I'm just drawing a blank to what could cause that..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          DerelictD 1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate @johnpoz
            last edited by

            Probably no different than any other asymmetric situation. Inbound on one interface with the reply traffic going out another with no state.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @Derelict
              last edited by

              @derelict huh? Just on first cup of coffee, but in what scenario would outbound traffic be evaluated by rule in outbound direction without a floating rule to do that? I thought only floating rules did outbound evaluation? There is default deny for outbound?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              DerelictD 1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate @johnpoz
                last edited by Derelict

                @johnpoz routing into an interface without reply-to and the reply traffic following the routing table. It's obviously something. Look at the states for the interesting traffic:

                pfctl -vvvss | grep -A4 _something_interesting_

                Get the rule number then look at the rule set to see what rule allowed the SYN in and created the inbound state.

                Either the ovpnc1 interface didn't see the TCP handshake or the state has been expired/killed.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                johnpozJ 1 Reply Last reply Reply Quote 0
                • ?
                  A Former User @Paddy
                  last edited by

                  @paddy said in TCP:PA FA and FPA in logs:

                  what I can do to remove them?

                  5aac199a-fbb9-4d8a-8c22-4f464b121438-image.png

                  configure the same as me and this will no longer be displayed ... You also do not have to worry I see this every time and everything works fine

                  1 Reply Last reply Reply Quote 1
                  • P
                    Paddy
                    last edited by

                    Thanks guys for taking the time to explain and showing how to hide them.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @Derelict
                      last edited by

                      @derelict said in TCP:PA FA and FPA in logs:

                      Either the ovpnc1 interface didn't see the TCP handshake or the state has been expired/killed.

                      Yeah I get that - but there is an outbound default deny?

                      Well guess there is ;)

                      [21.05.2-RELEASE][admin@sg4860.local.lan]/root: pfctl -sr | grep "Default deny rule IPv4"
                      block drop in inet all label "Default deny rule IPv4"
                      block drop out inet all label "Default deny rule IPv4"
                      

                      Ok that makes more sense now.. Thanks @Derelict

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      DerelictD 1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate @johnpoz
                        last edited by

                        @johnpoz I am going to submit a redmine to put "inbound/outbound" in those rule labels.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.