Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    0.0.0.0 IGMP spam in WAN log & LAN traffic being blocked

    Scheduled Pinned Locked Moved Firewalling
    23 Posts 9 Posters 10.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jahonixJ
      jahonix
      last edited by

      @doktornotor:

      This IGMP log flood does NOT come from anything user configured and CANNOT be stopped by anything user configured.

      Does that mean that every installation since 2.2. is affected? I somehow doubt that, not seeing it with other installs at clients.

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        Whether or not you see it depends on whether or not you are being hit by IGMP traffic.

        https://forum.pfsense.org/index.php?topic=88029.0

        1 Reply Last reply Reply Quote 0
        • jahonixJ
          jahonix
          last edited by

          Starts to make sense, thanks.
          I know which install I surely will not update until this is solved…

          1 Reply Last reply Reply Quote 0
          • B
            Bronko
            last edited by

            @2chemlud:

            Hi!

            I had to change my 'DSL-modem (now: Draytek Vigor 130 in modem mode) and since then (2 days) I have spam from 0.0.0.0 to 255.255.255.255 port 4944 on the WAN interface of my pfSense (2.2.1 nano 386).

            I have a block rule without logging on top of the WAN rules, but the log spamming continues…

            Solved the issue with my Draytek Vigor 130 by UNmarking "Broadcast DSL status to LAN" under ->System Maintenance->Management

            1 Reply Last reply Reply Quote 0
            • 2
              2chemlud Banned
              last edited by

              Cool! Any way to access the Draytek through the pfSense or do I need to remove it before I can reach the Draytek's weg GUI?

              1 Reply Last reply Reply Quote 0
              • B
                Bronko
                last edited by

                @2chemlud:

                Cool! Any way to access the Draytek through the pfSense or do I need to remove it before I can reach the Draytek's weg GUI?

                Yes: https://doc.pfsense.org/index.php/Accessing_modem_from_inside_firewall  ;)

                1 Reply Last reply Reply Quote 0
                • C
                  cmb
                  last edited by

                  The root cause here is fixed in 2.2.3.

                  1 Reply Last reply Reply Quote 0
                  • B
                    Bronko
                    last edited by

                    Ok, thanks for your 2.2.3 note, but the thread was hijacked  ;)

                    @jahonix:

                    2chemlud, your logs clearly show UDP traffic to a broadcast address. This thread is about IGMP to a multicast address. Please don't hijack.

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      @Bronko:

                      Ok, thanks for your 2.2.3 note, but the thread was hijacked  ;)

                      My comment there was re: the original issue, multicast firewall log spam.

                      1 Reply Last reply Reply Quote 0
                      • M
                        matrix200
                        last edited by

                        The problem is still present on my pfsense setup in VM with 2.2.3 installed.
                        Unchecked both log bogon networks block rule and private networks block rule.
                        Also created a custom rule to block igmp on lan interface.
                        No joy.

                        EDIT: I fixed it by patching /etc/inc/filter_log.inc
                        In function  conv_log_filter added the following lines in the foreach ($logarr as $logent) loop:

                        if (strpos($logent,"igmp") !== false)
                              continue;

                        Crude, but does the job.

                        Current network "hardware" :
                        Running 2.2RC in Virtualbox 4.2.16.

                        Retired:
                        ALIX2C2 , 4 gigabyte disk cf card running 2.0 (official release).

                        1 Reply Last reply Reply Quote 0
                        • M
                          medway01
                          last edited by

                          Thank you Bronko, Solved the problem for me too !

                          After pulling my hair out wondering why my firewall logs where filled with 0.0.0.0 to 255.255.255.255 port 4944 I stumbled on this post.

                          I am on pfsense 2.3.4-RELEASE with pfblockerng installed, its been working pretty good for me but a few days ago I changed over from ADSL to VDSL and swapped the modem to a vigor 130, unticking the 'Broadcast DSL status to LAN' in the vigor settings fixed it.

                          This broadcast to LAN is I believe used to keep a connection in a vigor router alive so the modem logs can be accessed inside the router.

                          I access my modem by using the https://doc.pfsense.org/index.php/Accessing_modem_from_inside_firewall guide, its worked with every modem i have used but the vigor 130 is the first one thats filled the logs ! I still have the occasional IGMP showing up:

                          MODEMACCESS 192.168.x.x 224.0.0.1 IGMP

                          Not a problem yet as seems to be only when i have the modem Admin page open.

                          –

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.