Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Finding source of traffic

    Scheduled Pinned Locked Moved General pfSense Questions
    5 Posts 2 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bradrel
      last edited by

      Hi All,

      Starting about a week ago, I am seeing a repeat spike in traffic for about 8 minutes at a time.  It shows up on the WAN RRD graph, but not the LAN graph.  The traffic also does not show up on the Squidguard Sarg report, which makes me think it is not port 80 traffic.

      What would be the best way for me to figure out where this traffic is coming from?

      WAN - 8 Hours https://www.dropbox.com/s/kdpxs2otl9ib7g9/WAN-8_hours.png
      WAN - 1 Month https://www.dropbox.com/s/3ff5zaufktqpdxt/WAN-1_month.png
      LAN - 8 Hours https://www.dropbox.com/s/8wn1yy9jwrn2bz5/LAN-8_hours.png
      LAN - 1 Month https://www.dropbox.com/s/40pxqf9jga1tz2i/LAN-1_month.png

      Thanks in advance for the help.
      –
      Brad

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Since that appears to be WAN in-pass traffic what firewall rules do you have on WAN?

        What version of pfSense are you running? Do you have any exposed services? NTP and DNS have both been widely exploited recently and should definitely not be exposed to WAN unless you have a good reason.

        It could be simply that your WAN address changed (do you have a dynamic WAN IP?) and the previous holder of that IP was hosting some service.

        If it happens regularly, which it does, just look at the state table when it's happening to see where the traffic is coming from and on what port.

        Steve

        1 Reply Last reply Reply Quote 0
        • B
          bradrel
          last edited by

          Thanks for the response.  I will dig into the state table this evening.  In the mean time, here are some answers to your questions:

          @stephenw10:

          Since that appears to be WAN in-pass traffic what firewall rules do you have on WAN?

          Allowing:
          Ping
          1194 (VPN)
          1195 (VPN)
          1196 (VPN)
          8843 (Web interface)
          3389 (RDP)

          I enabled logging on 3389, but that doesn't seem to be it. (I know allowing 8443 and 3389 isn't a great idea, however we are still working on getting all of the clients in a VPN)

          @stephenw10:

          What version of pfSense are you running? Do you have any exposed services? NTP and DNS have both been widely exploited recently and should definitely not be exposed to WAN unless you have a good reason.

          Version: 2.1-RELEASE
          NTP and DNS are not exposed externally.

          @stephenw10:

          It could be simply that your WAN address changed (do you have a dynamic WAN IP?) and the previous holder of that IP was hosting some service.
          Steve

          We do have an dynamic WAN IP, I will try to see the last time it changed.

          Thanks again for the response.  I will keep digging.
          –
          Brad

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            I assume those firewall rules, other than the webinterface, are for port forwards such that traffic on there would show on the LAN graph (if that's your only other interface).

            Traffic on WAN but not LAN is either something allowed by a firewall rule, could be someone trying to brute force your webgui for example (that would appear in the system log) or a response to something pfSense has requested. If you are running Snort for example it could be downloading new rules and failing to apply them correctly. Some package you tried to install which is continually downloading and failing.

            Steve

            1 Reply Last reply Reply Quote 0
            • B
              bradrel
              last edited by

              I haven't been able to figure out what is going on here.  I went ahead and disabled port 8843 from the outside and logged all ping request, however the odd traffic continues.

              In terms of packages, here is what is installed:
              Lightsquid
              mailreport
              NRPE v2
              pfBlocker - 4 lists set to download daily
              Sarg
              squid
              squidGuard

              I will keep looking at the States table, but nothing it jumping out at me.  Any other thoughts would be greatly appreciated.

              Thanks for the help so far.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.