Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UPNP?

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    31 Posts 6 Posters 10.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Well I was able to duplicate the issue..

      I normally don't use upnp - but had set it up for my sons xbox limiting it to just his xbox IP..

      So I edited the allow rules to allow my test box at 192.168.1.210 to use UPnP..  And so I create a rule via UPnP from the test box for couple different things rdp 3389, didn't work and brought up webserver on 8080 and didn't work

      but according to the status in pfsense upnp had created the rule - see attached, just showing the 8080 test here.  But firewall log shows these connections blocked?  See second attached

      running
      2.1-BETA1 (i386)
      built on Sun Feb 10 22:04:57 EST 2013
      FreeBSD 8.3-RELEASE-p5

      With gitsync of earlier this morning with the dyndns widget fix (other thread)

      upnptest.jpg
      upnptest.jpg_thumb
      blockedupnp.jpg
      blockedupnp.jpg_thumb

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • F
        foonus
        last edited by

        Thanks for taking the time to verify and document this issue John, Was hopeing that we could do this to prove that there indeed is a problem so that it does not go ignored as user error as my first post did…
        Let's hope it gets priority over grammatical corrections in one of the upcoming snapshots  ;)

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          No problem I don't have a use for UPnP myself, not really a fan - I had set it up for my sons xbox more just for reason to play with it and the rules of limiting UPnP access to specific devices for any possible future need (unlikely)

          I normally would just setup nat for his specific ports for his xbox..  But figure this would give some exp with UPnP - not a fan ;)

          But yeah if its going to be included as an option - it should work ;)  Which from my testing is not currently.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            There were some recent pf changes so I may need to rebuild the UPnP daemon again.

            I just did it now, try the next new snap (not up yet, will be dated later today) and see if it works.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • F
              foonus
              last edited by

              @jimp:

              There were some recent pf changes so I may need to rebuild the UPnP daemon again.

              I just did it now, try the next new snap (not up yet, will be dated later today) and see if it works.

              Just ran up:
              2.1-BETA1 (amd64)
              built on Thu Feb 14 16:30:41 EST 2013

              There is now an additional entry on the table for Teredo that was not there in the last snapshot , however the results are the same as described previously. Both App and external client report closed port  :-\

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                Any errors at all in the system log?

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Ok running

                  2.1-BETA1 (i386)
                  built on Fri Feb 15 04:06:54 EST 2013
                  FreeBSD 8.3-RELEASE-p5

                  Gitsync of couple of minutes ago..  Still seeing the same issue, rules look like there in place via upnp status, but blocked in the firewall.  I am not seeing anything in the system log about it. Or any other odd errors.

                  BTW that Teredo is not related – thats just that you have not turned that off on your clients, unless you have some reason to be using it??  I for sure can not see one if your running ipv6 on your wan?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    Anything listed in "pfctl -sn -a miniupnpd" and "pfctl -sr -a miniupnpd"?

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • F
                      foonus
                      last edited by

                      @jimp:

                      Anything listed in "pfctl -sn -a miniupnpd" and "pfctl -sr -a miniupnpd"?

                      2.1-BETA1 (amd64)
                      built on Fri Feb 15 04:33:17 EST 2013
                      FreeBSD 8.3-RELEASE-p5


                      Second IP (192.168.1.110) is a user with skype on his iphone, 192.168.1.105 is the seedbox with UPNP port closed issues.

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        Is igb0 actually your WAN/default route?

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • F
                          foonus
                          last edited by

                          @jimp:

                          Is igb0 actually your WAN/default route?

                          Yep, igb0 is hooked to the cable router (WAN). Its a simple setup, Intel Gigabit ET2 Quad port server adapter (only using 2 ports -.-) in a HP Proiliant DL380 server.
                          igb0 for WAN and igb1 for LAN. No errors show in system log at all.
                          As i noted in an earlier post, The only changes to a default pfsense install are selecting "6to4 tunnel" for IPv6 on the WAN, and "track interface" for ipv6 on the LAN. Everything else is set at installer default.

                          1 Reply Last reply Reply Quote 0
                          • G
                            gloomrider
                            last edited by

                            Hi

                            I can confirm this issue.  The "transmission" torrent application is a good tester because it both asks UPnP to open the port, then has it probed from the outside to confirm that the port has actually been opened.

                            
                            [2.1-BETA1][root@xxx.xxx.xxx]/root(1): pfctl -sn -a miniupnpd
                            rdr log quick on vr0 inet proto tcp from any to any port = 63839 keep state label "Transmission at 63839" rtable 0 -> 192.168.1.120 port 63839
                            rdr log quick on vr0 inet proto udp from any to any port = 63839 keep state label "Transmission at 63839" rtable 0 -> 192.168.1.120 port 63839
                            [2.1-BETA1][root@xxx.xxx.xxx]/root(2): pfctl -sr -a miniupnpd
                            pass in log quick on vr0 inet proto tcp from any to any port = 63839 flags S/SA keep state label "Transmission at 63839" rtable 0
                            pass in log quick on vr0 inet proto udp from any to any port = 63839 flags S/SA keep state label "Transmission at 63839" rtable 0
                            
                            

                            The best way I can describe the issue is that miniupnpd claims to have performed the requested operation, but didn't actually do it.  Or, perhaps pf is now behaving differently (ignoring?) miniupnpd's request.

                            My version with issue: 2.1-BETA1 (i386) built on Fri Feb 15 15:43:49 EST 2013

                            Reverting back to: 2.1-BETA1 (i386) built on Thu Jan 24 19:53:22 EST 2013

                            …resolves the issue

                            Same commands in the earlier snapshot (that works):

                            
                            [2.1-BETA1][root@xxx.xxx.xxx]/root(1): pfctl -sn -a miniupnpd
                            rdr log quick on vr0 inet proto tcp from any to any port = 59130 keep state label "Transmission at 59130" rtable 0 -> 192.168.1.120 port 59130
                            rdr log quick on vr0 inet proto udp from any to any port = 59130 keep state label "Transmission at 59130" rtable 0 -> 192.168.1.120 port 59130
                            [2.1-BETA1][root@xxx.xxx.xxx]/root(2): pfctl -sr -a miniupnpd
                            pass in log quick on vr0 inet proto tcp from any to any port = 59130 flags S/SA keep state label "Transmission at 59130" rtable 0
                            pass in log quick on vr0 inet proto udp from any to any port = 59130 flags S/SA keep state label "Transmission at 59130" rtable 0
                            
                            

                            NOTE: Port numbers are different because Transmission is assigning random port numbers each time I test.

                            I'm happy to run further tests.  Let me know what you want done.

                            Thanks

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              I updated to the latest snapshot (yesterday's) and I have no problem on i386. uTorrent opens a port and the port test succeeds.

                              If the rules are there, it should be working. When UPnP was really broken, there were no rules added there.

                              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                Still not working - showing it blocked in the firewall

                                Canyouseeme saying closed..  But clearly the firewall is blocking it - even thouse the pfctl shows rules should be there?

                                running
                                2.1-BETA1 (i386)
                                built on Sat Feb 16 10:53:05 EST 2013
                                FreeBSD 8.3-RELEASE-p5

                                [2.1-BETA1][root@pfsense.local.lan]/root(1): pfctl -sn -a miniupnpd
                                rdr log quick on em1 inet proto tcp from any to any port = 3389 keep state label "test" rtable 0 -> 192.168.1.210 port 3389
                                [2.1-BETA1][root@pfsense.local.lan]/root(2): pfctl -sr -a miniupnpd
                                pass in log quick on em1 inet proto tcp from any to any port = 3389 flags S/SA keep state label "test" rtable 0

                                yes em1 is my wan
                                WAN (wan)      -> em1        -> v4/DHCP4: 24.13.snipped/21
                                                                  v6/DHCP6: 2001:558:6033:12c:snippedf:a3d3/128

                                stillblocked.png
                                stillblocked.png_thumb

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • T
                                  Tikimotel
                                  last edited by

                                  Installed "2.1-BETA1 (amd64) built on Sat Feb 16 10:55:42 EST 2013"
                                  Still no go on upnp opening ports.

                                  tested with:
                                  www.grc.com (shields up!)
                                  www.canyouseeme.org
                                  and
                                  utorrent internal testing option…

                                  $ pfctl -sn -a miniupnpd
                                  rdr log quick on em0 inet proto udp from any to any port = 24927 keep state label "Skype UDP at 192.168.0.50:24927 (2238)" rtable 0 -> 192.168.0.50 port 24927
                                  rdr log quick on em0 inet proto tcp from any to any port = 24927 keep state label "Skype TCP at 192.168.0.50:24927 (2238)" rtable 0 -> 192.168.0.50 port 24927
                                  
                                  $ pfctl -sr -a miniupnpd
                                  pass in log quick on em0 inet proto udp from any to any port = 24927 flags S/SA keep state label "Skype UDP at 192.168.0.50:24927 (2238)" rtable 0
                                  pass in log quick on em0 inet proto tcp from any to any port = 24927 flags S/SA keep state label "Skype TCP at 192.168.0.50:24927 (2238)" rtable 0
                                  

                                  em0 is my WAN

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    foonus
                                    last edited by

                                    @johnpoz:

                                    Still not working - showing it blocked in the firewall

                                    John, If you set a static port map do you still see packets being blocked as indicated in your screenshot?
                                    If so this would indicate an issue outside of the miniupnp daemon itself…

                                    @jimp:

                                    I updated to the latest snapshot (yesterday's) and I have no problem on i386. uTorrent opens a port and the port test succeeds.

                                    If the rules are there, it should be working. When UPnP was really broken, there were no rules added there.

                                    Do you think a clean install would make a difference Jim?

                                    1 Reply Last reply Reply Quote 0
                                    • jimpJ
                                      jimp Rebel Alliance Developer Netgate
                                      last edited by

                                      Unlikely, but possible.

                                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                      Need help fast? Netgate Global Support!

                                      Do not Chat/PM for help!

                                      1 Reply Last reply Reply Quote 0
                                      • G
                                        gloomrider
                                        last edited by

                                        Jim,

                                        Please don't think I'm being confrontational, but what would it take to prove this issue exists for some of us?

                                        1 Reply Last reply Reply Quote 0
                                        • jimpJ
                                          jimp Rebel Alliance Developer Netgate
                                          last edited by

                                          A few things:

                                          1. A screenshot of the UPnP status screen showing the client ports that should be open. Use uTorrent or similar that has a built-in test.
                                          2. The pfctl commands mentioned above.
                                          3. The parsed and raw firewall log entries for the packets that should be matching the rule, but are not.
                                          4. The full contents of /tmp/rules.debug, pfctl -vvsr, and pfctl -vvsn
                                          5. The contents of netstat -rn
                                          6. A screenshot showing that the test failed.
                                          7. Repeat the same test with a manual port forward instead of UPnP and see if that works.

                                          I don't doubt that it's not working, but given the rest of the context, I'm not entirely sure it's UPnP and not something else just getting blamed on UPnP.

                                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                          Need help fast? Netgate Global Support!

                                          Do not Chat/PM for help!

                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            Tikimotel
                                            last edited by

                                            A snipped from "/tmp/rules.debug"
                                            Why is the miniupnpd anchor not ending in "/*"

                                            # Load balancing anchor
                                            rdr-anchor "relayd/*"
                                            # TFTP proxy
                                            rdr-anchor "tftp-proxy/*"
                                            
                                            # Setup Squid proxy redirect
                                            no rdr on em1 proto tcp from any to { 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8 } port 80
                                            rdr on em1 proto tcp from any to !(em1) port 80 -> 127.0.0.1 port 3128
                                            
                                            # UPnPd rdr anchor
                                            rdr-anchor "miniupnpd" (Why NOT "miniupnpd/*" ???)
                                            
                                            anchor "relayd/*"
                                            anchor "openvpn/*"
                                            anchor "ipsec/*"
                                            #---------------------------------------------------------------------------
                                            # default deny rules
                                            #---------------------------------------------------------------------------
                                            

                                            pfctl -vvsr results in no anchors named "miniupnpd"

                                            $ pfctl -vvsr
                                            @0 scrub on em0 all fragment reassemble
                                              [ Evaluations: 28002     Packets: 9561      Bytes: 1992949     States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @1 scrub on em1 all fragment reassemble
                                              [ Evaluations: 18441     Packets: 18225     Bytes: 3932485     States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @0 anchor "relayd/*" all
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @1 anchor "openvpn/*" all
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @2 anchor "ipsec/*" all
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @3 block drop in inet all label "Default deny rule IPv4"
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @4 block drop out inet all label "Default deny rule IPv4"
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @5 block drop in inet6 all label "Default deny rule IPv6"
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @6 block drop out inet6 all label "Default deny rule IPv6"
                                              [ Evaluations: 567       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @7 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @8 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @9 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @10 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @11 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @12 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @13 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @14 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @15 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @16 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @17 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @18 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @19 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @20 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @21 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @22 pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @23 pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @24 pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @25 pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @26 block drop quick inet proto tcp from any port = 0 to any
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @27 block drop quick inet proto tcp from any to any port = 0
                                              [ Evaluations: 1904      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @28 block drop quick inet proto udp from any port = 0 to any
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @29 block drop quick inet proto udp from any to any port = 0
                                              [ Evaluations: 985       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @30 block drop quick inet6 proto tcp from any port = 0 to any
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @31 block drop quick inet6 proto tcp from any to any port = 0
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @32 block drop quick inet6 proto udp from any port = 0 to any
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @33 block drop quick inet6 proto udp from any to any port = 0
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @34 block drop quick from <snort2c:0> to any label "Block snort2c hosts"
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @35 block drop quick from any to <snort2c:0> label "Block snort2c hosts"
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @36 block drop in log quick proto tcp from <sshlockout:0> to any port = ssh label "sshlockout"
                                              [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @37 block drop in log quick proto tcp from <webconfiguratorlockout:0> to any port = http label "webConfiguratorlockout"
                                              [ Evaluations: 1812      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @38 block drop in quick from <virusprot:0> to any label "virusprot overload table"
                                              [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @39 block drop in quick on em0 from <bogons:4652> to any label "block bogon IPv4 networks from WAN"
                                              [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @40 block drop in quick on em0 from <bogonsv6:68028> to any label "block bogon IPv6 networks from WAN"
                                              [ Evaluations: 139       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @41 block drop in on ! em0 inet from 84.xxx.xxx.0/23 to any
                                              [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @42 block drop in inet from 84.xxx.xxx.221 to any
                                              [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @43 block drop in on em0 inet6 from fe80::6a05:caff:fe0f:c58 to any
                                              [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @44 block drop in quick on em0 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
                                              [ Evaluations: 139       Packets: 139       Bytes: 50929       States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @45 block drop in quick on em0 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @46 block drop in quick on em0 inet from 100.64.0.0/10 to any label "Block private networks from WAN block 100.64/10"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @47 block drop in quick on em0 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @48 block drop in quick on em0 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @49 block drop in quick on em0 inet6 from fc00::/7 to any label "Block ULA networks from WAN block fc00::/7"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @50 pass in on em0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out WAN"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @51 pass out on em0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN"
                                              [ Evaluations: 567       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @52 block drop in on ! em1 inet from 192.168.0.0/24 to any
                                              [ Evaluations: 2754      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @53 block drop in inet from 192.168.0.1 to any
                                              [ Evaluations: 2187      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @54 block drop in on em1 inet6 from fe80::6a05:caff:fe0f:c59 to any
                                              [ Evaluations: 2187      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @55 pass in quick on em1 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
                                              [ Evaluations: 2181      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @56 pass in quick on em1 inet proto udp from any port = bootpc to 192.168.0.1 port = bootps keep state label "allow access to DHCP server"
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @57 pass out quick on em1 inet proto udp from 192.168.0.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server"
                                              [ Evaluations: 934       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @58 pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
                                              [ Evaluations: 2754      Packets: 108       Bytes: 9072        States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @59 pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
                                              [ Evaluations: 12        Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @60 pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
                                              [ Evaluations: 12        Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @61 pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
                                              [ Evaluations: 6         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @62 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
                                              [ Evaluations: 2754      Packets: 108       Bytes: 9072        States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @63 pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
                                              [ Evaluations: 567       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @64 pass out route-to (em0 84.xxx.xxx.1) inet from 84.xxx.xxx.221 to ! 84.xxx.xxx.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                                              [ Evaluations: 567       Packets: 4352      Bytes: 2038614     States: 17    ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @65 anchor "userrules/*" all
                                              [ Evaluations: 2754      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @66 pass in quick on em1 inet proto tcp from <managementhosts:1> to 192.168.0.1 port = https flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                                              [ Evaluations: 2754      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @67 pass in quick on em1 inet proto tcp from <managementhosts:1> to 192.168.0.1 port = ssh flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                                              [ Evaluations: 1714      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @68 pass in quick on em1 inet proto tcp from <managementhosts:1> to 192.168.0.1 port = http flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                                              [ Evaluations: 1714      Packets: 1197      Bytes: 890290      States: 2     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @69 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = domain flags S/SA keep state label "USER_RULE: Allow internal network to DNS forwarder"
                                              [ Evaluations: 1694      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @70 pass in quick on em1 inet proto udp from 192.168.0.0/24 to 192.168.0.1 port = domain keep state label "USER_RULE: Allow internal network to DNS forwarder"
                                              [ Evaluations: 369       Packets: 628       Bytes: 66445       States: 1     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @71 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = ntp flags S/SA keep state label "USER_RULE: Allow internal network to NTPd server"
                                              [ Evaluations: 1696      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @72 pass in quick on em1 inet proto udp from 192.168.0.0/24 to 192.168.0.1 port = ntp keep state label "USER_RULE: Allow internal network to NTPd server"
                                              [ Evaluations: 2         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @73 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = 2189 flags S/SA keep state label "USER_RULE: Allow internal network to upnp and nat-pmp"
                                              [ Evaluations: 1696      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @74 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = 5153 flags S/SA keep state label "USER_RULE: Allow internal network to upnp and nat-pmp"
                                              [ Evaluations: 1694      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @75 pass in quick on em1 inet from 192.168.0.0/24 to 224.0.0.0/8 flags S/SA keep state label "USER_RULE: Allow multicast"
                                              [ Evaluations: 1847      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @76 pass in quick on em1 inet from 192.168.0.0/24 to 239.0.0.0/30 flags S/SA keep state label "USER_RULE: Allow multicast"
                                              [ Evaluations: 1847      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @77 pass in quick on em1 inet proto icmp from 192.168.0.0/24 to 192.168.0.1 keep state label "USER_RULE: Allow internal network to ping LAN IP"
                                              [ Evaluations: 1847      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @78 block drop in quick on em1 inet from any to 192.168.0.1 label "USER_RULE: Reject all else to LAN IP"
                                              [ Evaluations: 1847      Packets: 1694      Bytes: 86336       States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @79 pass in quick on em1 inet from 192.168.0.0/24 to any flags S/SA keep state label "USER_RULE: Default LAN -> any"
                                              [ Evaluations: 153       Packets: 4824      Bytes: 2762700     States: 18    ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @80 anchor "tftp-proxy/*" all
                                              [ Evaluations: 573       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @81 pass in quick on em1 proto tcp from any to ! (em1:2) port = http flags S/SA keep state
                                              [ Evaluations: 573       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]
                                            @82 pass in quick on em1 proto tcp from any to ! (em1:2) port = 3128 flags S/SA keep state
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 73134 ]</managementhosts:1></managementhosts:1></managementhosts:1></bogonsv6:68028></bogons:4652></virusprot:0></webconfiguratorlockout:0></sshlockout:0></snort2c:0></snort2c:0>
                                            
                                            $ pfctl -sn -a miniupnpd
                                            rdr log quick on em0 inet proto udp from any to any port = 17040 keep state label "Skype UDP at 192.168.0.51:17040 (2239)" rtable 0 -> 192.168.0.51 port 17040
                                            rdr log quick on em0 inet proto tcp from any to any port = 17040 keep state label "Skype TCP at 192.168.0.51:17040 (2239)" rtable 0 -> 192.168.0.51 port 17040
                                            
                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.