Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPv6 still logging despite rule

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 4 Posters 580 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @marcosm
      last edited by

      @marcosm
      I think i found the setting?

      b4f4be57-27d5-42ad-ac78-04c4bd65aded-image.png

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M johnpozJ 2 Replies Last reply Reply Quote 0
      • M
        marcosm Netgate @michmoor
        last edited by

        @michmoor That's the one.

        1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @michmoor
          last edited by johnpoz

          @michmoor yeah if look your rule has never been triggered see the 0/0 in the states column.. That tells you while your rule would block and not log. There was something before it that was blocking and logging.. That checkbox to block all IPv6 puts a rule high up in the rules that is not actually shown in the gui that blocks and logs. There probably should be a block all ipv6 and not log it option.

          Or you could just not check that block IPv6 and do your own blocking of it, and log or not log per your rules, etc.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 1
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Yup that^. If you choose to allow IPv6 in Sys > Adv > Net and then block it with your user rule you can still log IPv4 default blocks which you probably want to see.

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @stephenw10
              last edited by

              @stephenw10 @johnpoz

              I typically add a global logging rule to each interface

              As an example

              5a112e33-2842-478f-bd37-6fa9f5168b98-image.png

              IPv6 was just flooding logs

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              johnpozJ 1 Reply Last reply Reply Quote 1
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @michmoor
                last edited by

                @michmoor out of the box the default deny logs anyway.. If your going to add a reject on the end of your interfaces that logs vs the default deny which is just a block.. You could just turn off the default deny logging.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @johnpoz
                  last edited by

                  @johnpoz Maybe its me (i accept my limitations here) but this just seems confusing to me. Uncheck this setting or check this setting. Log here but it wont log there...
                  I feel this should be handled a bit better or at least a clearer explanation.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @michmoor
                    last edited by

                    @michmoor out of the box it logs default deny.. If you don't want it to log - uncheck the box that says it will log the default deny.. Not sure how that could be confusing?

                    log.jpg

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @johnpoz
                      last edited by

                      @johnpoz
                      Out of the box log default denies is good but where I’m getting tripped up on is why was IPv6 traffic that is hitting default deny even though I had a rule to stop logging in my floating rules hence this thread. I fixed it but it just seems a bit not straightforward

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @michmoor
                        last edited by johnpoz

                        @michmoor its not hitting the default deny, its hitting the block all you set..

                        When you uncheck allow IPv6

                        allowipv6.jpg

                        It creates this rule

                        blockallipv6.jpg

                        Notice there is no log statement.. BUT!!! if you have the default deny set to log, which is default then when it creates that rule it includes the log statement in the rule

                        blockipv6log.jpg

                        Could it been done a bit better.. Yeah maybe.. Vs using the default deny log setting to determine if the block all IPv6 rule should log, they could have a different check box under where you allow or block all IPv6..

                        Or maybe in the log settings where they have log bogon, rfc1918, allow and deny etc.. they could have a check box to turn off logging when you uncheck the allow IPv6..

                        I have personally always turned off the logging of default deny... I have my own rules that log what I want to see, etc. I don't want or need to see all the noise that is blocked by the default deny.. Now if troubleshooting something sure prob a good idea to turn on logging of default deny... But in normal day to day operation I don't need or want to see the vast amount of noise.. For example on my wan I log only SYN traffic that hits my wan that is not allowed.. And then some common UDP ports..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          michmoor LAYER 8 Rebel Alliance @johnpoz
                          last edited by

                          @johnpoz Ok i see what you are saying now. I went back and re-read the documentation to solidify my understanding. Granted i think the wording around IPv6 could use some work in the GUI i generally understand what the knobs do here.
                          Thanks for having patience

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.