Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    I want to investigate whether there was any communication between terminals across the LAN network.

    Scheduled Pinned Locked Moved General pfSense Questions
    10 Posts 4 Posters 963 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Yet_learningPFSenseY
      Yet_learningPFSense
      last edited by

      We are using a Netgate 1100, we have two wireless LAN routers under the Netgate distribution, (this is hypothetical) if the contaminated terminal was communicating and attacking another terminal on the LAN network, how can we check the communication logs?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @Yet_learningPFSense
        last edited by

        @Yet_learningPFSense so this traffic passes across pfsense? Devices on the same network talking to each other - pfsense has no insight into this traffic.

        If traffic passes through pfsense, then you could log traffic if you wanted, or specific traffic that is allowed. Or you could look in the state table for any current traffic, etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        Yet_learningPFSenseY 1 Reply Last reply Reply Quote 1
        • Yet_learningPFSenseY
          Yet_learningPFSense @johnpoz
          last edited by

          @johnpoz Thank you. Yes, the terminal under the wireless LAN parent (assuming it is contaminated) its traffic is passing through pfsense. I will try to check in the state table. Alternatively, you may be able to search for the IP address in question in other, Firewall logs and see if it is accessing the IP addresses of other terminals.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @Yet_learningPFSense
            last edited by

            @Yet_learningPFSense so your wireless lan routers is on a different vlan this what what your calling your lan network?

            if your not routing traffic through pfsense - pfsense is not going to see lan to lan traffic.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            Yet_learningPFSenseY 1 Reply Last reply Reply Quote 1
            • Yet_learningPFSenseY
              Yet_learningPFSense @johnpoz
              last edited by

              @johnpoz Sorry, I didn't explain myself well enough and misquoted you. Two wireless LAN routers (and the terminals under their control) are indeed different vlan. At home, there are two lines, SoftbankAir and FLET'S Hikari, but FLET'S Hikari (which is connected to multiple devices, and port-based VLAN is set so that wireless LAN parent devices cannot communicate with each other) is currently unavailable, and the devices with port-based VLAN -> PFsense -> QFsense -> SoftbankAir. SoftbankAir and connected to a Softbank-only network to which only one QubesOS PC was connected.

              Port-based VLANs were only used for communication between 1-2, 1-3, 1-4 and 1-5, 1 to the LAN port of PFsense (OPT is dedicated to Admin and you cannot enter Admin unless you connect to this port) and 1-4 for all wireless LAN parent devices that are connected to a hub, The WAN port of PFSense is connected to SoftbankAir. So we know that communication cannot be sent across the port-based VLAN devices, but we were wondering if it is possible to attack via PFsense or via SoftbankAir's router function". It is a difficult situation to imagine, but we think that such an attacker might have such a method.

              NightlySharkN 1 Reply Last reply Reply Quote 0
              • NightlySharkN
                NightlyShark @Yet_learningPFSense
                last edited by

                @Yet_learningPFSense I 'm sorry to interfere, but, what is even QFSense?

                Yet_learningPFSenseY 1 Reply Last reply Reply Quote 1
                • Yet_learningPFSenseY
                  Yet_learningPFSense @NightlyShark
                  last edited by

                  @NightlyShark Sorry, I made a post-translation check error on DeepL and assumed QFSense. The correct name is VLAN -> PFSense -> SoftbankAir. But it would be interesting if there were multiple software router OSs in one router and you could switch between them via GUI. I imagined that it would be a good idea.

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @Yet_learningPFSense
                    last edited by johnpoz

                    @Yet_learningPFSense said in I want to investigate whether there was any communication between terminals across the LAN network.:

                    But it would be interesting if there were multiple software router OSs in one router

                    I use to have this sort of thing setup when I was running pfsense on esxi. I could switch between stable and dev/snapshot versions of pfsense. Any any other router distro playing with.

                    I just setup them all to use the same mac for the their wans that was connected to my cable modem - so the cable modem didn't see a change.. Nor my isp so same IP all the time, etc.

                    Now you couldn't run them at the same time, but switch between one router version and another was as simple as turning off vm X and turning on vm Y..

                    With zfs and new features, it should be fairly easy to say boot X.A version of pfsense or X.B version

                    If you have this
                    VLAN -> PFSense -> SoftbankAir

                    And you want to know if anything from vlan went or tried to go to SoftbankAir - just set your rules on your vlan interface to log all traffic your interested in seeing.. out of the box all default deny is logged... But you can also set allow to be logged, or any specific rules to log.

                    Keep in mind that any existing traffic wouldn't be logged, until a new session is created. So you might want to clear all states, or at least validate there are no existing states that you might want to have logged going forward. Kill off any such states.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    Yet_learningPFSenseY 1 Reply Last reply Reply Quote 2
                    • Yet_learningPFSenseY
                      Yet_learningPFSense @johnpoz
                      last edited by

                      @johnpoz Thank you. That's great, I didn't realize that something like QubesOS could switch software routers almost at the touch of a button. It would be possible to switch the software router when the attacker sends a packet and tries to guess the router type, and then switch the software router when the packet arrives to disrupt it (although I don't think such an acrobatic thing is realistic).

                      The VLAN equipment is a NETGEAR switching hub, so I don't think it has logging capabilities, but if it has mirroring capabilities, I might be able to set up a box for analysis so that I can look at the logs separately there. Alternatively, I don't often log into PFSense unless there is a problem, but I have ntopng installed and would like to be able to check it even roughly here.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        It would probably be better to pretend to be some other router or in fact to not expose anything that allows determining the router type at all. IMO 😉

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.