Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is it normal to log this traffic?

    Scheduled Pinned Locked Moved General pfSense Questions
    15 Posts 4 Posters 445 Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      SteveITS Rebel Alliance @marchand.guy
      last edited by

      @marchand-guy rules have a setting to log or not.

      Why would you need this rule? Packets between devices on the same subnet don’t go through the router.

      Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
      Upvote 👍 helpful posts!

      1 Reply Last reply Reply Quote 0
      • M Offline
        marchand.guy @patient0
        last edited by

        @patient0 Trying to show what you asked, it got me looking harder at my LAN interface definition.

        I found this under "Static IPv4 Configuration"
        IPv4 address 192.168.0.1 /24
        Maybe changing that to 192.168.0.0 /24 wil correct the situation?

        patient0P 1 Reply Last reply Reply Quote 0
        • patient0P Online
          patient0 @marchand.guy
          last edited by

          @marchand-guy said in Is it normal to log this traffic?:

          Maybe changing that to 192.168.0.0 /24 wil correct the situation?

          No, the configuration of your LAN interface is correct.

          But @SteveITS question stands and you show us a screenshot of the firewall rules for LAN and an example of the log we may be able to help.

          Traffic from your LAN to 192.168.0.1 is normal for a lot of things, like DNS queries, NTP, DHCP. But traffic from one computer on LAN to another computer on LAN is not supposed to go through the firewall.

          And in pfSense if there is no rule on an interface, all traffic is blocked. That's why after a fresh installation you have two 'Allow all' rules (1x IPv4 and 1x IPv6) in the firewall rules for the default LAN interface.

          M 1 Reply Last reply Reply Quote 0
          • M Offline
            marchand.guy @patient0
            last edited by

            @patient0 I know about loging on/off. It's the fact that I seem to need this rule that bugs me.
            Here we are:
            interface.png
            rule.png
            logs.png

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              Obviously traffic to the pfSense IP itself needs to pass the firewall. Usually you would not need a rule for that because by default there is a pass all rule for LAN traffic. If you have removed/disabled that though you need to add rules to pass the traffic you want.

              M 2 Replies Last reply Reply Quote 0
              • M Offline
                marchand.guy @stephenw10
                last edited by marchand.guy

                @stephenw10 There you go! Thank you. I probably removed the default LAN rule when I installed the firewall. Hence the need to put it back. Did not notice it since the other interfaces did not have any. Except for the WAN with the RFC and private auto rules.

                1 Reply Last reply Reply Quote 0
                • M Offline
                  marchand.guy @stephenw10
                  last edited by

                  @stephenw10 Just for curiosity, was the default LAN rule looking like this?
                  Screenshot from 2025-04-05 12-27-29.png
                  Thanks

                  M 1 Reply Last reply Reply Quote 0
                  • M Offline
                    marchand.guy @marchand.guy
                    last edited by

                    Never mind.
                    Found the answer at
                    https://docs.netgate.com/pfsense/en/latest/firewall/rule-list-intro.html

                    Thanks

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      Nope, the default rules look like:
                      Screenshot from 2025-04-05 19-53-43.png

                      That allows traffic from LAN clients to access anything. So including both the LAN address (for sevices like dns, ntp etc) and external destinations.

                      It's included on LAN because the vast majority of installs will want to pass that. At least initially. But it's only added to LAN. Once you start adding more interfaces you probably want more complex rules.

                      M 1 Reply Last reply Reply Quote 0
                      • M Offline
                        marchand.guy @stephenw10
                        last edited by

                        @stephenw10 That is what I saw on the link I gave. You need to scroll down.

                        Screenshot from 2025-04-05 14-58-45.png

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S Offline
                          stephenw10 Netgate Administrator
                          last edited by

                          Ah, yes. Cross-posted!

                          M 1 Reply Last reply Reply Quote 0
                          • M Offline
                            marchand.guy @stephenw10
                            last edited by

                            @stephenw10 Good. And that is why I deleted it. Too permissive. What suprised me is the need to create a LAN rule to allow the LAN addresses to communicate with the LAN gateway, that also happens to be the firewall. Normally, you don't need a rule if you communicate within a LAN (not crossing a boundary). I guess that is special case since the target is the firewall and you need to control what reaches it, even it's own network.

                            S 1 Reply Last reply Reply Quote 0
                            • S Offline
                              SteveITS Rebel Alliance @marchand.guy
                              last edited by

                              @marchand-guy I would say most firewalls have a deny by default setup. However most/many software firewalls have a rule to allow their own subnet. Windows for instance accounts for that by defining different rules for public or private marked networks.

                              Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                              Upvote 👍 helpful posts!

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.