Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NAT Logs

    General pfSense Questions
    4
    50
    1.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mcury @michmoor
      last edited by mcury

      @michmoor said in NAT Logs:

      @mcury said in NAT Logs:

      All of these services running in a Raspberry pi 5 8GB hehe

      You are a brave man! I have an XCP-NG 2x server set up.
      I am planning a future migration of Graylog. When i first stood it up years ago i made the very very bad error of storing all data on the vhd - So i have a 500GB drive attached to this Virtual Machine. As you can probably imagine wanting to back up the VM takes some time. I wanted to move it to an NFS share at the very least but my drives are not very performant. Its a project that is on the radar but i never have time.

      If you are using the community version, that is possible with the Graylog 6.0 community version
      But, If I were you, I wouldn't update to 6.1 series.

      They are slowly dropping support to opensearch, if you check the installation guide, they even removed opensearch from it.
      The alternative now is Graylog-datanode.

      Since the "archive" is a paid feature, Graylog-datanode doesn't give you that option in the community version, as opensearch used to.

      I used to archive everything in my NAS and restore them once needed, now I can't do it anymore.
      So, I'm keeping two months of logs only, its enough to get 30GB of logs.

      I have a script that cleans up for me, but not on a schedule:

      #!/bin/bash
      for counter in {0..38}; do  curl -X DELETE --key /path_to_your/_key/key_datanode.crt --cert /path_to_your/cert/cert_datanode.crt --cacert /path_to_your/ca//ca_datanode.crt https://raspberry.yourdoamin.arpa:9200/pfsense_$counter --pass datanode_password_you_configured; done
      

      In the example above, it delete closed indices from 0 to 38 and keep the others untouched.
      I can run it each of the indices I have.

      Edit: For bigger customers with higher requirements, a NFS share would be a good idea indeed.
      Perhaps a cluster of graylog servers also..

      dead on arrival, nowhere to be found.

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @mcury
        last edited by

        @mcury @stephenw10

        Found something interesting..
        IPfix is working out (@mcury seriously..you the man) but I noticed some data is not being logged

        I have pfSense set up as a Tailscale subnet router. There is another Subnet router within my tailnet.
        I can reach devices behind the other subnet router. The LAN on that side is 192.168.8.0/24. I am connecting from 192.168.6.0/24.

        11f1952d-3b5e-4836-b1a4-d091e50abe02-image.png

        No IPFix logs were created. @stephenw10 Does pflow treat "vpns" differently somehow ?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Not VPNs generally, just Tailscale I think. The ACLs applied by Tailscale are not pf so flows are not logged from it.

          See: https://www.youtube.com/watch?v=Fg_jIPVcioY&t=1240s

          M M 2 Replies Last reply Reply Quote 0
          • M
            mcury @stephenw10
            last edited by

            @stephenw10 said in NAT Logs:

            Not VPNs generally, just Tailscale I think. The ACLs applied by Tailscale are not pf so flows are not logged from it.

            See: https://www.youtube.com/watch?v=Fg_jIPVcioY&t=1240s

            perhaps creating an OUT firewall rule on the destination LAN and tracking that ?

            dead on arrival, nowhere to be found.

            1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @stephenw10
              last edited by

              @stephenw10

              hmm. The documentation says something a bit different. Its based on state creation which dictates the flow record creation. At least that's how I'm interpreting it.

              7356d75d-d0d4-45e9-914d-299ee7891851-image.png

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Right, states are created by pf. Anything that creates a state should be logged. I would expect!

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Traffic coming from the tailscale network into the tailscale interface in pfSense is not filtered by pf unless it is coming the tailscale interface itself.

                  Yes you would only see an outbound state on the destination interface.

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @stephenw10
                    last edited by

                    @stephenw10

                    I believe pflow does not capture any VPN traffic.
                    I also have Wireguard peers and there is no data from IPFix.
                    I can try and test with OpenVPN but i have a feeling its going to be the same result.

                    So far my guess is that physical interfaces are tracked but logical ones are not.

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      I would be very surprised if that was the case. pflow collects data directly from pf. And pf doesn't care about physical NICs, it filters and opens states on all interface types, physical or otherwise.

                      Of course I've been surprised before but.... 😉

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @stephenw10
                        last edited by michmoor

                        @stephenw10

                        hmm you may be right.
                        172.26.0.10 is a wireguard peer and here is the IPfix record. So now I'm not sure why its not coming up in my dashboard...hmmmm.....

                        ok figured it out...@stephenw10 you are correct again sir.

                        40ee3f50-6b0a-42b0-b70c-e4bcfd550927-image.png

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        M 1 Reply Last reply Reply Quote 2
                        • M
                          michmoor LAYER 8 Rebel Alliance @michmoor
                          last edited by

                          @stephenw10 One more thing.

                          Tailscale flows are indeed captured by IPFix.

                          The source is the pfsense and the destination is the LAN behind another subnet router.

                          c944d282-70c0-4f95-8c80-77930ec1fd96-image.png

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 1
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Yup there we go. Tailscale acts more like a proxy in firewall terms. You can only see the traffic to/from it and not the source/destination inside the tailscale network.

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.