Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    how to stop logging blocked LAN IGMP?

    Scheduled Pinned Locked Moved General pfSense Questions
    78 Posts 7 Posters 3.7k Views 9 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ Online
      johnpoz LAYER 8 Global Moderator @Mission-Ghost
      last edited by

      @Mission-Ghost is the pass rule you creating actually seeing evaluations? ie is the states going up vs 0/0?

      Creating a rule does not take effect until the rules are reloading - if for some reason your rules are not loading, then no they wouldn't work.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

      M 1 Reply Last reply Reply Quote 0
      • dennypageD Offline
        dennypage @Mission-Ghost
        last edited by

        @Mission-Ghost did you apply the changes after creating the rule?

        M 1 Reply Last reply Reply Quote 0
        • M Offline
          Mission-Ghost @dennypage
          last edited by Mission-Ghost

          @dennypage I did apply the rule.

          Here's something interesting. I just went back and put a new rule in at the top of the interface 50_ENT list, ending in 718, to block IGMP any any and LOG it.

          It did log it, but it ALSO logs the 2040 rule being activated. (Fig. 1) So how is a top rule on an interface taking effect AND an invisible rule I can't find anywhere (including floating) both take effect? Interesting, too, that my rule is prefaced with USER_RULE and the 2040 rule is not.

          Then I edited rule 718 and just changed it to PASS instead of BLOCK, and I get BOTH a PASS and BLOCK USER_RULE (in the same second of time) log in addition to the mystery rule 2040 block log entries, which keep going on. (Fig 2)

          My understanding of how rules work suggests this is not consistent with how the system is documented to work...

          Fig 1:
          bfc8dbf8-46af-4f09-89df-b7d866653305-image.png

          Fig 2:
          175eb0b5-ce60-4ef8-8dd1-3a457323f2e6-image.png

          1 Reply Last reply Reply Quote 0
          • M Offline
            Mission-Ghost @johnpoz
            last edited by

            @johnpoz it appears not.

            I now have a floating and interface rule to block these and log and both show 0 packets but a handful of state creations.

            The floating rule (...5020) appears to be taking precedence of any activity and logging on the interface rule, as I would expect it to. Floating rule is logging both passes and blocks as the interface rule did in a previous experiment.

            fa72d324-a3e3-45fa-8c79-451ab1ac7688-image.png

            af231fd1-95cc-4277-a806-ae2c8d7ade10-image.png

            cd9ad8e3-337c-4db9-b3cb-0276c332fe8a-image.png

            dennypageD 1 Reply Last reply Reply Quote 0
            • dennypageD Offline
              dennypage @Mission-Ghost
              last edited by

              @Mission-Ghost We can't fully see your rules, as they are blocked by the pop-up. Does the floating rule have IP options enabled? If not, then it isn't going to match.

              M 2 Replies Last reply Reply Quote 0
              • M Offline
                Mission-Ghost @dennypage
                last edited by

                @dennypage Good catch. I think I forgot them. Hang on...

                1 Reply Last reply Reply Quote 0
                • M Offline
                  Mission-Ghost @dennypage
                  last edited by

                  @dennypage

                  63c1e2ec-d264-4d2a-aacf-d817d6950b21-image.png

                  Floating rule:
                  3afbd9ad-66cc-42b1-b317-654423c71f80-image.png

                  (Applied, both...)

                  Same story:

                  b3896cd8-e450-4985-9218-70acfa0e3d78-image.png

                  1 Reply Last reply Reply Quote 0
                  • M Offline
                    Mission-Ghost
                    last edited by Mission-Ghost

                    Curiously, the switch that the Roku box (and the router-on-a-stick) plug into reports no Multicast packets. The Roku box is on Port 4.

                    Is pfSense hallucinating?

                    7ecd1eba-ffa4-4dda-940d-b1d9bf2d02e4-image.png

                    johnpozJ dennypageD M 4 Replies Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator @Mission-Ghost
                      last edited by johnpoz

                      @Mission-Ghost so it prob just not logging 224.0.0.2 which is all routers.

                      edit:

                      Curious what settings you have in your roku - because I am sniffing on interface my rokus are on - and not seeing any 224.0.0.2 traffic. I have 2 ultras currently being used, and they are not sending that.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                      dennypageD 1 Reply Last reply Reply Quote 0
                      • dennypageD Offline
                        dennypage @johnpoz
                        last edited by dennypage

                        @johnpoz said in how to stop logging blocked LAN IGMP?:

                        Curious what settings you have in your roku - because I am sniffing on interface my rokus are on - and not seeing any 224.0.0.2 traffic. I have 2 ultras currently being used, and they are not sending that.

                        IGMP v2 leave messages are sent the all routers group. You will see it only when a host turns off a multicast subscription.

                        Edit:

                        And just to be clear, all IGMPv2 and IGMPv3 messages, whether queries, reports or leaves, are sent with the router alert option. They will all trigger the rule.

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • dennypageD Offline
                          dennypage @Mission-Ghost
                          last edited by

                          @Mission-Ghost Can you do a quick packet capture?

                          Something like this:

                          tcpdump -i igc0 -w /tmp/igmp.pcap igmp
                          

                          where igc0 is the interface in question.

                          Be sure that the packet capture includes a time during which you are seeing entries logged.

                          M 1 Reply Last reply Reply Quote 0
                          • M Offline
                            MoonKnight @Mission-Ghost
                            last edited by MoonKnight

                            @Mission-Ghost

                            Try to edit your rule again an add this into the advanced session:

                            a4239d85-5aa3-4fbe-a4ad-e361c761e4a2-image.png

                            I don't use floating rules on this one. This is just from one of my vlan interfaces.

                            --- 25.07.1 ---
                            Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                            Kingston DDR4 2666MHz 16GB ECC
                            2 x HyperX Fury SSD 120GB (ZFS-mirror)
                            2 x Intel i210 (ports)
                            4 x Intel i350 (ports)

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ Online
                              johnpoz LAYER 8 Global Moderator @dennypage
                              last edited by

                              @dennypage said in how to stop logging blocked LAN IGMP?:

                              You will see it only when a host turns off a multicast subscription.

                              Why is his doing it every few seconds?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                              J dennypageD 2 Replies Last reply Reply Quote 0
                              • J Offline
                                JeremyJ 0 @johnpoz
                                last edited by

                                original poster here. love when an old thread comes back to life!

                                I resolved my problem by replacing all of my Dlink access points with other brands.

                                1 Reply Last reply Reply Quote 1
                                • dennypageD Offline
                                  dennypage @johnpoz
                                  last edited by

                                  @johnpoz said in how to stop logging blocked LAN IGMP?:

                                  @dennypage said in how to stop logging blocked LAN IGMP?:

                                  You will see it only when a host turns off a multicast subscription.

                                  Why is his doing it every few seconds?

                                  A good question. There are a couple of things that can be at play here.

                                  The first is that IGMP requires all packets to be sent multiple times with a short interval in-between. This is how IGMP deals with lost packets. The number of times is the "robustness" value and defaults to 2, but implementations are allowed to choose any value of 2 or above.

                                  The other is that some systems simply frequently join and leave groups on a frequent basis. Apple devices do this frequently on 224.0.0.251 (mDNS). I don't know if this is an attempt to force mDNS rediscovery (doubtful), service restarts, or some other thing I don't know of. Pretty inefficient in my book, but it only happens with mDNS --they don't do it on other addresses.

                                  1 Reply Last reply Reply Quote 0
                                  • dennypageD Offline
                                    dennypage @Mission-Ghost
                                    last edited by

                                    @Mission-Ghost said in how to stop logging blocked LAN IGMP?:

                                    Curiously, the switch that the Roku box (and the router-on-a-stick) plug into reports no Multicast packets. The Roku box is on Port 4.

                                    Is pfSense hallucinating?

                                    FWIW, I would trust pfSense a lot more than I would trust multicast accounting of consumer grade switches.

                                    1 Reply Last reply Reply Quote 0
                                    • M Offline
                                      Mission-Ghost
                                      last edited by

                                      Good morning!

                                      I had a short service window this morning. The logs citing a nonexistent rule had continued overnight.

                                      So I rebooted and the log entry attribution switched to my policy routing rule on the Ent vlan, which was not set to log. So I toggled the log checkbox on, saved, applied, and then repeated turning it off. No change…still log entries kept coming from it for igmp. Rebooted again. No change.

                                      I then enabled my igmp rule at the top of the Ent vlan to pass igmp packets without logging and I got one pass log entry for that rule and the block log entries attributed to my policy routing rule resumed. So I copied the policy routing rules to a new one and deleted the one being attributed in the logs as blocking when not set to block nor log. The logs continued and were still being attributed to the now-deleted rule.

                                      I rebooted again but the problem continued. So I then shut off udpbroadcastrelay but the logs continued. I rebooted again and the logs stopped. I then turned udpbroadcastrelay back on and the logs have remained stopped. I’m leaving my igmp pass rule in place and not changing its logging option (currently off) for now. I don’t know if the pass rule is now working or something else happened with the last reboot. Nothing obvious is apparent.

                                      Note I have not made any changes to the roku box to which the mystery logs attribute the igmp packet. I have never seen a roku option related to igmp. Recall this all started when i was setting up the broadcast tv reciever/streamer (the HDHomeRun box) on that vlan.

                                      In this case I don’t have D-Link access points. I have netgear. The roku and hdhomerun box though are ethernet, not wireless.

                                      Clearly there is something screwy and buggy going on with rules, logging and igmp. I have no idea how to reproduce the problem and can’t easily experiment because it’s a production system. I’ll try the suggested packet capture later when I get a chance.

                                      However, we should not overlook that the logs have been coming from nonexistent end-user rules or rules set to pass and not log, and rules set to capture these packets get substantially ignored.

                                      1 Reply Last reply Reply Quote 0
                                      • M Offline
                                        Mission-Ghost @dennypage
                                        last edited by

                                        @dennypage Thank you for the thoughtful response.

                                        I ran (I have an 4200 so my interface was igc0):

                                        tcpdump -i igc0 -w /tmp/igmp.pcap igmp
                                        

                                        for about a full minute, and this is all I got:

                                        3bbd4c0a-8279-48e6-9a5c-616527990f06-image.png

                                        I also ran it with igc0.50 for a couple of minutes to try to account for the VLAN and the results were:

                                        3483c191-0c0a-4a25-a57f-578b4471f9bc-image.png

                                        Is this meaningful?

                                        dennypageD 1 Reply Last reply Reply Quote 0
                                        • stephenw10S Offline
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Can you open it in wireshark?

                                          M 1 Reply Last reply Reply Quote 0
                                          • dennypageD Offline
                                            dennypage @Mission-Ghost
                                            last edited by

                                            @Mission-Ghost It's a binary file. Can you post or PM it please?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.