Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No log entries

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 3 Posters 892 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      I noticed that connections regardless if they are permitted or denied, are not showing up in the firewall logs under Normal or Dynamic View.
      Interestingly enough, when checking states, i do see it there.

      I was in the process of tshooting a wireguard client install so i wanted to see traffic logs from my local machine to the remote. Putty gave me a connection timed out. I am checking the firewall logs and i do not see the connection attempts there. Odd. Perhaps the connections are queued up so i would have to wait a few seconds but after a few minutes, i still dont see my logs. Lucky enough it turned out to be an iptables issues on the remote end but after i initiated an SSH session , i still didnt see any log entries.
      For what its worth i am seeing log entries for other rules.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @michmoor
        last edited by

        @michmoor said in No log entries:

        For what its worth i am seeing log entries for other rules.

        Did you set your rule to log? Out of the box only default deny is logged in the firewall log. If you create some allow rule for something, it wouldn't be logged unless you stated it to do so.

        Even if you created a specific rule, and set it to log - its possible some other rule actually is the one to allow the traffic, and it is not set to log, etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @johnpoz
          last edited by

          @johnpoz there is one rule, permit any, and it’s set to log. I do see logs matching this rule (and interface) so that’s what stood out to me the fact that a specific flow isn’t being logged

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @michmoor
            last edited by

            @michmoor You only have the 1 default lan any any rule?

            No floating rules?

            You sure you just didn't miss it, by default only like 50 entries are shown in the log. And logging on a allow only logs the first entry, when the state is created. If followup connections are made and the state is there there would be nothing logged, because the connection is allowed by the state.

            If you want to see it log again, you would need to kill any existing states. And you prob want to increase what is shown in the logs. I have mine set to 2000 (max) for example.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            M 1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Also check for rules on interface groups which are easy to overlook.

              If you run at the command line: pfctl -vss
              You can see the rule number that opened a state.
              Then you can check which rule that was using: pfctl -vvsr

              Steve

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @johnpoz
                last edited by

                @johnpoz Floating rules yes, but not for the Interface in question - Wireguard

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by

                  @stephenw10 said in No log entries:

                  mber that opened a state.
                  Then you can check which rule that was using: pfctl -vvs

                  got it. ill do some testing today and report back.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.