Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [SOLVED] Help understanding firewall rule behaviour

    Scheduled Pinned Locked Moved Firewalling
    5 Posts 4 Posters 599 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      anarokus
      last edited by

      Hi,

      I'm running two pfsense devices in HA running 2.3.5.

      On our Guest wifi rule I have initially created a temporary allow any rule (allow ipv4 any any).
      When I checked the firewall logs I noticed that some traffic is still being blocked by the default ipv4 block all rule.

      So I created a new explicit block all rule as my last firewall rule to confirm that the traffic matches this rule and sure enough the traffic is passing the allow any rule and getting blocked by the explicit block all rule.

      The pattern that I'm noticing is that all of the traffic that is matching the default block all rule is tcp port 80 and 443. The protocol is mostly TCP:PA or TCP:FA but sometimes it is TCP:PFA.

      I added specific allow rules from the source net to tcp port 80 and tcp port 443, but I'm still seeing traffic missing these rules and hitting the explicit block all rule.

      Under what criteria could this happen?
      Is the firewall maybe not generating states and thus subsequent packets in the flow being blocked because the state doesnt exist? Or possibly some parts of the traffic flow going through one firewall and the rest through the other, preventing a complete state from being formed (asymmetric traffic flow..)?
      If so, how would I go about troubleshooting this?

      Thanks for the help.

      Shane

      1 Reply Last reply Reply Quote 0
      • NogBadTheBadN
        NogBadTheBad
        last edited by

        Out of state packets maybe :-

        https://doc.pfsense.org/index.php/Why_do_my_logs_show_%22blocked%22_for_traffic_from_a_legitimate_connection

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        1 Reply Last reply Reply Quote 0
        • H
          Harvy66
          last edited by

          Cellphones are notorious for these invalid states.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            ^ yup!!! They are horrible at them.. Especially noticed them with my son's android.  I just turned off default logging and set a rule to only log syn.. So to remove the log spam of out of state traffic.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • A
              anarokus
              last edited by

              Thanks everyone! It was indeed out of state packets.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.