• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Is it normal to log this traffic?

General pfSense Questions
4
15
284
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    SteveITS Galactic Empire @marchand.guy
    last edited by Apr 5, 2025, 2:33 PM

    @marchand-guy rules have a setting to log or not.

    Why would you need this rule? Packets between devices on the same subnet don’t go through the router.

    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
    Upvote πŸ‘ helpful posts!

    1 Reply Last reply Reply Quote 0
    • M
      marchand.guy @patient0
      last edited by Apr 5, 2025, 3:25 PM

      @patient0 Trying to show what you asked, it got me looking harder at my LAN interface definition.

      I found this under "Static IPv4 Configuration"
      IPv4 address 192.168.0.1 /24
      Maybe changing that to 192.168.0.0 /24 wil correct the situation?

      P 1 Reply Last reply Apr 5, 2025, 3:44 PM Reply Quote 0
      • P
        patient0 @marchand.guy
        last edited by Apr 5, 2025, 3:44 PM

        @marchand-guy said in Is it normal to log this traffic?:

        Maybe changing that to 192.168.0.0 /24 wil correct the situation?

        No, the configuration of your LAN interface is correct.

        But @SteveITS question stands and you show us a screenshot of the firewall rules for LAN and an example of the log we may be able to help.

        Traffic from your LAN to 192.168.0.1 is normal for a lot of things, like DNS queries, NTP, DHCP. But traffic from one computer on LAN to another computer on LAN is not supposed to go through the firewall.

        And in pfSense if there is no rule on an interface, all traffic is blocked. That's why after a fresh installation you have two 'Allow all' rules (1x IPv4 and 1x IPv6) in the firewall rules for the default LAN interface.

        M 1 Reply Last reply Apr 5, 2025, 3:58 PM Reply Quote 0
        • M
          marchand.guy @patient0
          last edited by Apr 5, 2025, 3:58 PM

          @patient0 I know about loging on/off. It's the fact that I seem to need this rule that bugs me.
          Here we are:
          login-to-view
          login-to-view
          login-to-view

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Apr 5, 2025, 4:06 PM

            Obviously traffic to the pfSense IP itself needs to pass the firewall. Usually you would not need a rule for that because by default there is a pass all rule for LAN traffic. If you have removed/disabled that though you need to add rules to pass the traffic you want.

            M 2 Replies Last reply Apr 5, 2025, 4:12 PM Reply Quote 0
            • M
              marchand.guy @stephenw10
              last edited by marchand.guy Apr 5, 2025, 4:15 PM Apr 5, 2025, 4:12 PM

              @stephenw10 There you go! Thank you. I probably removed the default LAN rule when I installed the firewall. Hence the need to put it back. Did not notice it since the other interfaces did not have any. Except for the WAN with the RFC and private auto rules.

              1 Reply Last reply Reply Quote 0
              • M
                marchand.guy @stephenw10
                last edited by Apr 5, 2025, 4:29 PM

                @stephenw10 Just for curiosity, was the default LAN rule looking like this?
                login-to-view
                Thanks

                M 1 Reply Last reply Apr 5, 2025, 6:20 PM Reply Quote 0
                • M
                  marchand.guy @marchand.guy
                  last edited by Apr 5, 2025, 6:20 PM

                  Never mind.
                  Found the answer at
                  https://docs.netgate.com/pfsense/en/latest/firewall/rule-list-intro.html

                  Thanks

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Apr 5, 2025, 6:56 PM

                    Nope, the default rules look like:
                    login-to-view

                    That allows traffic from LAN clients to access anything. So including both the LAN address (for sevices like dns, ntp etc) and external destinations.

                    It's included on LAN because the vast majority of installs will want to pass that. At least initially. But it's only added to LAN. Once you start adding more interfaces you probably want more complex rules.

                    M 1 Reply Last reply Apr 5, 2025, 6:59 PM Reply Quote 0
                    • M
                      marchand.guy @stephenw10
                      last edited by Apr 5, 2025, 6:59 PM

                      @stephenw10 That is what I saw on the link I gave. You need to scroll down.

                      login-to-view

                      1 Reply Last reply Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator
                        last edited by Apr 5, 2025, 9:48 PM

                        Ah, yes. Cross-posted!

                        M 1 Reply Last reply Apr 6, 2025, 1:08 PM Reply Quote 0
                        • M
                          marchand.guy @stephenw10
                          last edited by Apr 6, 2025, 1:08 PM

                          @stephenw10 Good. And that is why I deleted it. Too permissive. What suprised me is the need to create a LAN rule to allow the LAN addresses to communicate with the LAN gateway, that also happens to be the firewall. Normally, you don't need a rule if you communicate within a LAN (not crossing a boundary). I guess that is special case since the target is the firewall and you need to control what reaches it, even it's own network.

                          S 1 Reply Last reply Apr 6, 2025, 4:17 PM Reply Quote 0
                          • S
                            SteveITS Galactic Empire @marchand.guy
                            last edited by Apr 6, 2025, 4:17 PM

                            @marchand-guy I would say most firewalls have a deny by default setup. However most/many software firewalls have a rule to allow their own subnet. Windows for instance accounts for that by defining different rules for public or private marked networks.

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote πŸ‘ helpful posts!

                            1 Reply Last reply Reply Quote 0
                            12 out of 15
                            • First post
                              12/15
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.