Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    how to stop logging blocked LAN IGMP?

    Scheduled Pinned Locked Moved General pfSense Questions
    78 Posts 7 Posters 3.7k Views 9 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      Mission-Ghost @dennypage
      last edited by

      @dennypage Good catch. I think I forgot them. Hang on...

      1 Reply Last reply Reply Quote 0
      • M Offline
        Mission-Ghost @dennypage
        last edited by

        @dennypage

        63c1e2ec-d264-4d2a-aacf-d817d6950b21-image.png

        Floating rule:
        3afbd9ad-66cc-42b1-b317-654423c71f80-image.png

        (Applied, both...)

        Same story:

        b3896cd8-e450-4985-9218-70acfa0e3d78-image.png

        1 Reply Last reply Reply Quote 0
        • M Offline
          Mission-Ghost
          last edited by Mission-Ghost

          Curiously, the switch that the Roku box (and the router-on-a-stick) plug into reports no Multicast packets. The Roku box is on Port 4.

          Is pfSense hallucinating?

          7ecd1eba-ffa4-4dda-940d-b1d9bf2d02e4-image.png

          johnpozJ dennypageD M 4 Replies Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator @Mission-Ghost
            last edited by johnpoz

            @Mission-Ghost so it prob just not logging 224.0.0.2 which is all routers.

            edit:

            Curious what settings you have in your roku - because I am sniffing on interface my rokus are on - and not seeing any 224.0.0.2 traffic. I have 2 ultras currently being used, and they are not sending that.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

            dennypageD 1 Reply Last reply Reply Quote 0
            • dennypageD Offline
              dennypage @johnpoz
              last edited by dennypage

              @johnpoz said in how to stop logging blocked LAN IGMP?:

              Curious what settings you have in your roku - because I am sniffing on interface my rokus are on - and not seeing any 224.0.0.2 traffic. I have 2 ultras currently being used, and they are not sending that.

              IGMP v2 leave messages are sent the all routers group. You will see it only when a host turns off a multicast subscription.

              Edit:

              And just to be clear, all IGMPv2 and IGMPv3 messages, whether queries, reports or leaves, are sent with the router alert option. They will all trigger the rule.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • dennypageD Offline
                dennypage @Mission-Ghost
                last edited by

                @Mission-Ghost Can you do a quick packet capture?

                Something like this:

                tcpdump -i igc0 -w /tmp/igmp.pcap igmp
                

                where igc0 is the interface in question.

                Be sure that the packet capture includes a time during which you are seeing entries logged.

                M 1 Reply Last reply Reply Quote 0
                • M Offline
                  MoonKnight @Mission-Ghost
                  last edited by MoonKnight

                  @Mission-Ghost

                  Try to edit your rule again an add this into the advanced session:

                  a4239d85-5aa3-4fbe-a4ad-e361c761e4a2-image.png

                  I don't use floating rules on this one. This is just from one of my vlan interfaces.

                  --- 25.07.1 ---
                  Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                  Kingston DDR4 2666MHz 16GB ECC
                  2 x HyperX Fury SSD 120GB (ZFS-mirror)
                  2 x Intel i210 (ports)
                  4 x Intel i350 (ports)

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Online
                    johnpoz LAYER 8 Global Moderator @dennypage
                    last edited by

                    @dennypage said in how to stop logging blocked LAN IGMP?:

                    You will see it only when a host turns off a multicast subscription.

                    Why is his doing it every few seconds?

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                    J dennypageD 2 Replies Last reply Reply Quote 0
                    • J Offline
                      JeremyJ 0 @johnpoz
                      last edited by

                      original poster here. love when an old thread comes back to life!

                      I resolved my problem by replacing all of my Dlink access points with other brands.

                      1 Reply Last reply Reply Quote 1
                      • dennypageD Offline
                        dennypage @johnpoz
                        last edited by

                        @johnpoz said in how to stop logging blocked LAN IGMP?:

                        @dennypage said in how to stop logging blocked LAN IGMP?:

                        You will see it only when a host turns off a multicast subscription.

                        Why is his doing it every few seconds?

                        A good question. There are a couple of things that can be at play here.

                        The first is that IGMP requires all packets to be sent multiple times with a short interval in-between. This is how IGMP deals with lost packets. The number of times is the "robustness" value and defaults to 2, but implementations are allowed to choose any value of 2 or above.

                        The other is that some systems simply frequently join and leave groups on a frequent basis. Apple devices do this frequently on 224.0.0.251 (mDNS). I don't know if this is an attempt to force mDNS rediscovery (doubtful), service restarts, or some other thing I don't know of. Pretty inefficient in my book, but it only happens with mDNS --they don't do it on other addresses.

                        1 Reply Last reply Reply Quote 0
                        • dennypageD Offline
                          dennypage @Mission-Ghost
                          last edited by

                          @Mission-Ghost said in how to stop logging blocked LAN IGMP?:

                          Curiously, the switch that the Roku box (and the router-on-a-stick) plug into reports no Multicast packets. The Roku box is on Port 4.

                          Is pfSense hallucinating?

                          FWIW, I would trust pfSense a lot more than I would trust multicast accounting of consumer grade switches.

                          1 Reply Last reply Reply Quote 0
                          • M Offline
                            Mission-Ghost
                            last edited by

                            Good morning!

                            I had a short service window this morning. The logs citing a nonexistent rule had continued overnight.

                            So I rebooted and the log entry attribution switched to my policy routing rule on the Ent vlan, which was not set to log. So I toggled the log checkbox on, saved, applied, and then repeated turning it off. No change…still log entries kept coming from it for igmp. Rebooted again. No change.

                            I then enabled my igmp rule at the top of the Ent vlan to pass igmp packets without logging and I got one pass log entry for that rule and the block log entries attributed to my policy routing rule resumed. So I copied the policy routing rules to a new one and deleted the one being attributed in the logs as blocking when not set to block nor log. The logs continued and were still being attributed to the now-deleted rule.

                            I rebooted again but the problem continued. So I then shut off udpbroadcastrelay but the logs continued. I rebooted again and the logs stopped. I then turned udpbroadcastrelay back on and the logs have remained stopped. I’m leaving my igmp pass rule in place and not changing its logging option (currently off) for now. I don’t know if the pass rule is now working or something else happened with the last reboot. Nothing obvious is apparent.

                            Note I have not made any changes to the roku box to which the mystery logs attribute the igmp packet. I have never seen a roku option related to igmp. Recall this all started when i was setting up the broadcast tv reciever/streamer (the HDHomeRun box) on that vlan.

                            In this case I don’t have D-Link access points. I have netgear. The roku and hdhomerun box though are ethernet, not wireless.

                            Clearly there is something screwy and buggy going on with rules, logging and igmp. I have no idea how to reproduce the problem and can’t easily experiment because it’s a production system. I’ll try the suggested packet capture later when I get a chance.

                            However, we should not overlook that the logs have been coming from nonexistent end-user rules or rules set to pass and not log, and rules set to capture these packets get substantially ignored.

                            1 Reply Last reply Reply Quote 0
                            • M Offline
                              Mission-Ghost @dennypage
                              last edited by

                              @dennypage Thank you for the thoughtful response.

                              I ran (I have an 4200 so my interface was igc0):

                              tcpdump -i igc0 -w /tmp/igmp.pcap igmp
                              

                              for about a full minute, and this is all I got:

                              3bbd4c0a-8279-48e6-9a5c-616527990f06-image.png

                              I also ran it with igc0.50 for a couple of minutes to try to account for the VLAN and the results were:

                              3483c191-0c0a-4a25-a57f-578b4471f9bc-image.png

                              Is this meaningful?

                              dennypageD 1 Reply Last reply Reply Quote 0
                              • stephenw10S Offline
                                stephenw10 Netgate Administrator
                                last edited by

                                Can you open it in wireshark?

                                M 1 Reply Last reply Reply Quote 0
                                • dennypageD Offline
                                  dennypage @Mission-Ghost
                                  last edited by

                                  @Mission-Ghost It's a binary file. Can you post or PM it please?

                                  1 Reply Last reply Reply Quote 0
                                  • M Offline
                                    Mission-Ghost @stephenw10
                                    last edited by

                                    @stephenw10 I'm getting Wireshark on my Linux box and will attempt to open the tcpdump file in due course. Thanks!

                                    1 Reply Last reply Reply Quote 0
                                    • M Offline
                                      Mission-Ghost
                                      last edited by Mission-Ghost

                                      PMs with igmp.pcap sent with my thanks.

                                      This afternoon I removed the two disabled IGMP pass rules, which I had set up to try to stop this logging, from pfSense and the mysterious logging still has not returned.

                                      This seems to indicate the disabled (and even when enabled) pass rules were having no discernible effect on the logging of IGMP packets from a Roku box on the Ent network attributed to, at varying times, a non-existent or previously deleted rule, or, this morning after a reboot, the policy routing rule (!) of all things, which also was configured to not log.

                                      This may be one of those things that is very difficult to catch and fix given it will probably happen on a production system that cannot be experimented with easily and given I don't know what triggered this to begin with. However, the three reboots seem to have cleared it for now, much like the OP discovered cleared his issue as well.

                                      dennypageD 1 Reply Last reply Reply Quote 0
                                      • dennypageD Offline
                                        dennypage @Mission-Ghost
                                        last edited by

                                        @Mission-Ghost I took a look at your pcap. Your Netgear (192.168.10.22) switch or WAP is operating as an IGMP querier, soliciting IGMP messages from hosts in the network. Nothing particularly unusual about that assuming you have the Netgear configured for IGMP snooping. I was curious to line this up with some of your error messages and went back to look at detail information in your prior logs.

                                        Then, the sky fell. The Netgear has an address of 192.168.10.22. Looking at your prior posts, packets from address 192.168.10.22 are arriving on at least 4 different pfSense interfaces:

                                        • 30_UTIL
                                        • 40_CAM
                                        • 50_ENT
                                        • 60_GUEST_GM

                                        Screenshot 2025-10-28 at 08.07.48.png

                                        Screenshot 2025-10-28 at 08.08.23.png

                                        Obviously, that should not happen, and is indicative of a significant issue. Either you have multicast packet flooding, or the VLANs are not configured/functioning as expected.

                                        I recommend setting aside IGMP logging issues for a moment, and going back to validate the basic configuration of switch/WAP VLANs and pfSense interfaces. It's a good idea to start a new forum topic for that, with a link to this topic in your initial post.

                                        M 1 Reply Last reply Reply Quote 3
                                        • stephenw10S Offline
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Yikes, nice catch.

                                          1 Reply Last reply Reply Quote 0
                                          • M Offline
                                            Mission-Ghost @dennypage
                                            last edited by Mission-Ghost

                                            @dennypage Wow! Thank you for making the time and effort to examine the capture file. This is an interesting revelation.

                                            I noticed the Netgear records in the capture file but did not recognize the meaning and importance of them. It does makes sense that the packets would arrive on all the interfaces: the Netgears are on trunk ports and host all six VLANs.

                                            The Netgears are WAX610 WAPs. I'll go through them (there are four) and shut off or verify multicast functions are shut off.

                                            Thanks again. Networking is so much more complex now than when I did it at work (Thick- and Thin-net!) 30 years ago. It's almost not the same thing at all anymore.

                                            johnpozJ dennypageD 2 Replies Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.