Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Question Regarding Default Deny Rules

    Scheduled Pinned Locked Moved General pfSense Questions
    112 Posts 7 Posters 44.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      djtech2k
      last edited by

      I just built a new pfsense device to run my home lab network. I just put it into prod today and have a question about the "Default Deny Rules".

      I am starting with a very basic setup where there is just a LAN port, WAN Port, and a port for VPN. I have pfblockerNG installed and running with just a few feeds. Connectivity seems to be ok in terms of intranet and internet. When I check the fw logs, I am seeing a lot of traffic blocked like the following:

      Interface: LAN
      Rule: Default deny rule IPv4 (1000000103)
      Source: 192.168.x.x:Portx
      Destination: 3.222.x.x:Porty

      I have lots of these rules and I cannot figure out what the traffic is or why its getting blocked. I know there seems to be a lot of discussion about the default rules but I cannot find an answer. The source/destination IP's and ports are all kinds of different ones so its not like just 1 of anything. I'd like to know what this traffic is and why its blocked. I thought LAN had the default allow any/any rule. I only have a few rules in there and of course none of them impact this traffic.

      Any helpful hints or explanations that may help explain or help me figure out how to diagnose this?

      S dennypageD 2 Replies Last reply Reply Quote 0
      • JonathanLeeJ
        JonathanLee
        last edited by

        Something on your lan is calling out to that address, I assume that is your wan address, is it a specific port that you see or is it random? I am willing to bet it is 5xxx ports for push notifications. What is the port range?

        Make sure to upvote

        1 Reply Last reply Reply Quote 0
        • D
          djtech2k
          last edited by

          The source ports (from LAN) have a wide range, from 33300-58800, or something close. The destination ports (Internet Address) seem to be port 443.

          There are default deny entries on the WAN interface also but they're mostly port 443 and not nearly as many as the LAN log entries.

          Since the Default Deny rules are not visible, I really have no idea why the LAN packets are being blocked.

          JonathanLeeJ 1 Reply Last reply Reply Quote 0
          • JonathanLeeJ
            JonathanLee @djtech2k
            last edited by

            @djtech2k source is always different destination is what matters it’s 443? You said you have internet right? That might just be your url blocker blocking something. Can you run a pcap on that interface and inspect it? The firewall can generate pcap files locally it is under diagnostics.

            Make sure to upvote

            1 Reply Last reply Reply Quote 0
            • D
              djtech2k
              last edited by

              Yes, my WAN port is connected to my ISP gateway device so I am in a double NAT situation.

              Yes, on the repetitive log entries for the LAN interface, there are lots of different LAN IP's with various ports being blocked that have a destination of lots of different IP's and port 443.

              I have lots of devices, both wired and wireless, connected to this pfsense now.

              JonathanLeeJ 1 Reply Last reply Reply Quote 0
              • JonathanLeeJ
                JonathanLee @djtech2k
                last edited by

                @djtech2k run a pcap file and inspect it for what is occurring. isolate and identify.

                Make sure to upvote

                1 Reply Last reply Reply Quote 0
                • D
                  djtech2k
                  last edited by

                  Working on that now. Its hard to match up IP's from the capture to the log. So far I grabbed 1 IP that I saw and the only thing I see in the capture is 1 entry connecting to a "furbo" FQDN, so that must be device on my called a Furbo. It is a camera device that has an app to use to view video/sound, among other things. It seems to have a lot of comms in the pcap. I have no idea what the traffic is for but it must be for the streaming aspect. So I have no idea why any of that traffic would get blocked by the default block rule.

                  I am going to keep looking, but so far I see a lot of packets but nothing that I can see that should be blocked.

                  1 Reply Last reply Reply Quote 0
                  • D
                    djtech2k
                    last edited by

                    Since I typed the last message, I see 8 consecutive blocks on the LAN interface from an IP that is assigned to an Active Directory Domain Controller. The Source IP is its LAN IP, the source port ranged in the 52700's and the destination IP is about 3 different IP's, all going to port 443.

                    I did a quick ip lookup on 1 IP and it says its owned by Microsoft. So I would assume the traffic is normal, but pfsense is blocking it with the default rule.

                    johnpozJ 1 Reply Last reply Reply Quote 1
                    • D
                      djtech2k
                      last edited by djtech2k

                      I have grabbed a few different pcap's and been looking thru the fw logs and various different IP's. Another example is Roku devices getting packets blocked outbound. I do not see a pattern on the traffic so I do not understand why I am seeing all of the default deny rule blocks. It would be helpful to know what the Default Deny Rule does so I would know why its being blocked.

                      JonathanLeeJ 1 Reply Last reply Reply Quote 1
                      • JonathanLeeJ
                        JonathanLee @djtech2k
                        last edited by JonathanLee

                        @djtech2k you said your running pfblocking? If so can you cross reference the block logs with similar time stamps ?

                        Make sure to upvote

                        1 Reply Last reply Reply Quote 0
                        • D
                          djtech2k
                          last edited by

                          Yes, I have pfblockerNG installed and running.

                          Which logs are you talking about cross referencing? I am new to pfblocker so I don't know a lot about the logs yet but I am not seeing much in the logs section. The ip_block.log shows a few lines but I see nothing that seems to correspond to the packets I mentioned before. There are a total of 5 entries in that log for today whereas there are tons of entries in the firewall logs like I mentioned.

                          JonathanLeeJ 1 Reply Last reply Reply Quote 0
                          • JonathanLeeJ
                            JonathanLee @djtech2k
                            last edited by

                            @djtech2k if everything is working and nothing in the pcap file is causing you issues I would just ignore it. You said you have web traffic, that is port 443 so that is working, DoH is over 443 and if you have blocked that in pfSense pfblocking that might be what is occurring and or a tcp connection has an inconsistent flag set and or window and the firewall is blocking it. Default rules are anything that wants out from the inside is approved and anything trying to get in is blocked, unless you changed your access control lists, I would inspect the pcap files to trace down the blocks and times. I do not use pfblocking, I am a customized Squid user myself. Again lots of other users can help you with pfblocking. You could try to disable it for a bit and see if the logs go away also.

                            Make sure to upvote

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @djtech2k
                              last edited by johnpoz

                              @djtech2k said in Question Regarding Default Deny Rules:

                              The Source IP is its LAN IP, the source port ranged in the 52700's and the destination IP is about 3 different IP's, all going to port 443.

                              the default lan rule is any any - there should be nothing blocked by the default lan rule.. What does it show in the log - can you post it showing your lan IP and some random IP on the internet owned by MS wouldn't be giving anything away.

                              What your lan rules exactly - can you post them, is it just the default any any..

                              pfblocker blocks wouldn't show up as the default deny.. unless your not allowing them.

                              Rules are evaluated top down, first rule to trigger - so if you do not allow where your lan IP is trying to go - then yes it would be blocked by the default deny.. please post up your lan interface rules.

                              here are mine for example

                              lanrules.jpg

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • S
                                SteveITS Galactic Empire @djtech2k
                                last edited by

                                @djtech2k can you also post the log entry? Might be https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html

                                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                Upvote 👍 helpful posts!

                                1 Reply Last reply Reply Quote 0
                                • dennypageD
                                  dennypage @djtech2k
                                  last edited by

                                  @djtech2k Assuming TCP, check the protocol flags -- the blocks may be showing up because the state has expired. It's rather common. When you see blocks on with flags of TCP:FPA, TCP:FA, TCP:RA, etc. it generally means that the block occurred because the connection state has expired because the other end has already closed the connection.

                                  If you see TCP:S or TCP:SA, that's a real block.

                                  johnpozJ JonathanLeeJ 2 Replies Last reply Reply Quote 3
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @dennypage
                                    last edited by

                                    @dennypage that is very likely it the multiple ones he saw in a row to the MS IP could be the retrans.

                                    We would know for sure if he posted the actual log of what he is seeing.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • JonathanLeeJ
                                      JonathanLee @dennypage
                                      last edited by

                                      @dennypage I thought the same thing because he said he has web traffic

                                      Make sure to upvote

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        It could just be LAN side devices trying to use closed states.

                                        https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html#out-of-state-web-server-packets

                                        JonathanLeeJ 1 Reply Last reply Reply Quote 1
                                        • JonathanLeeJ
                                          JonathanLee @stephenw10
                                          last edited by

                                          @stephenw10 I see this with Squid all the time too, same closed tcp syc ack

                                          Make sure to upvote

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            djtech2k
                                            last edited by djtech2k

                                            Thanks all. Just catching up here. Here are some details.

                                            Firewall Logs: Here are some examples of what I am seeing. There are many more so this is just a few scraped from the top of the log when I opened it today.

                                            This example is showing 3 consecutive identical packets, but it is not always like this. There's plenty that are different on each line.
                                            458a7749-b70b-4229-b592-b6e8830f14fd-image.png

                                            Now that I have the whole network going thru pfsense, I am seeing a ton of repetitive traffic like this coming from Roku devices. As a matter of fact, when I scroll thru the last 750 lines of FW log, I would say the majority of it is traffic like that picture and all on the various Roku devices I have. This was not the case when I started seeing the logs, but I guess the Roku devices have a lot of traffic being blocked for some reason. When I first started, Roku was not dominating the block logs.

                                            Here are my LAN port rules. There is not a lot here yet as I am rolling into it slowly. I have the 2 block rules from pfblockerNG. I have 2 rules that I added to get pfsense to connect to an upstream VPN for IP's that are a member of a group. Then there are the default allow rules.

                                            1cdaff00-ebeb-4042-bee7-f978ed2f1e10-image.png

                                            With all of this, I do not notice a functional problem but I do want to better understand why I see things being blocked when I see no rules or reasons it is being blocked. I know the logs image is just a small example, but its many, many lines of logs. For reference, from 10:56:24am to 12:49:12pm today, there are over 750 FW log lines. Maybe thats not considered high volume and IDK if this is on pace or in a lull of some sort, but thats just a reference I see now.

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.