Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Alias firewall block rule not blocked!

    Scheduled Pinned Locked Moved Firewalling
    56 Posts 5 Posters 8.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      pfctl -vvss | grep -A3 192.168.1.17

      Find the state you think should not be there out of that. Post it.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • M
        mrsunfire
        last edited by

        @Derelict said in Alias firewall block rule not blocked!:

        pfctl -vvss | grep -A3 192.168.1.17

        igb4 udp 192.168.1.1:53 <- 192.168.1.17:50872       NO_TRAFFIC:SINGLE
           age 00:00:55, expires in 00:00:05, 1:0 pkts, 56:0 bytes, rule 164
           id: 010000005cd28985 creatorid: 3dddfb2a
        igb4 udp 192.168.1.255:32414 <- 192.168.1.10:55418       NO_TRAFFIC:SINGLE
        --
        igb4 udp 192.168.1.1:53 <- 192.168.1.17:43906       NO_TRAFFIC:SINGLE
           age 00:00:55, expires in 00:00:05, 1:0 pkts, 59:0 bytes, rule 164
           id: 010000005cd28988 creatorid: 3dddfb2a
        igb5 ipv6-icmp ff02::1[192] <- fe80::201:5cff:fe6b:e046[192]       NO_TRAFFIC:NO_TRAFFIC
        --
        igb4 udp 114.55.218.176:32100 <- 192.168.1.17:27288       NO_TRAFFIC:SINGLE
           age 00:00:48, expires in 00:00:12, 1:0 pkts, 32:0 bytes, rule 178
           id: 010000005cd28a38 creatorid: 485eb46e
        igb4 udp 47.91.90.222:32100 <- 192.168.1.17:27288       NO_TRAFFIC:SINGLE
           age 00:00:48, expires in 00:00:12, 1:0 pkts, 32:0 bytes, rule 178
           id: 010000005cd28a39 creatorid: 485eb46e
        igb4 udp 192.168.1.1:161 <- 192.168.1.10:56756       MULTIPLE:MULTIPLE
        --
        igb4 udp 107.20.134.235:32100 <- 192.168.1.17:27288       NO_TRAFFIC:SINGLE
           age 00:00:48, expires in 00:00:12, 1:0 pkts, 32:0 bytes, rule 178
           id: 000000005cd28acc creatorid: 485eb46e
        igb4.300 udp 8.8.8.8:53 <- 10.0.2.2:45009       NO_TRAFFIC:SINGLE
        --
        igb4 udp 192.168.1.1:53 <- 192.168.1.17:51499       SINGLE:MULTIPLE
           age 00:00:33, expires in 00:00:00, 1:1 pkts, 56:72 bytes, rule 181
           id: 000000005cd28c1a creatorid: b13ad8d2
        igb5 udp 2a02:8071:800:0:527:2af9:a20f:552a[41679] -> 2001:8d8:fe:53:0:d9a0:52c2:100[53]       MULTIPLE:SINGLE
        --
        igb4 udp 107.20.134.235:32100 <- 192.168.1.17:25029       SINGLE:MULTIPLE
           age 00:00:33, expires in 00:00:00, 1:1 pkts, 32:48 bytes, rule 181
           id: 000000005cd28c1b creatorid: b13ad8d2
        igb5 udp xxx:64148 -> 217.160.83.194:53       MULTIPLE:SINGLE
        --
        igb5 udp xxx:57526 (192.168.1.17:25029) -> 107.20.134.235:32100       MULTIPLE:SINGLE
           age 00:00:33, expires in 00:00:00, 1:1 pkts, 32:48 bytes, rule 141
           id: 000000005cd28c1c creatorid: b13ad8d2
        igb5 udp 2a02:8071:800:0:527:2af9:a20f:552a[45428] -> 2001:503:e239::3:2[53]       MULTIPLE:SINGLE
        --
        igb4 udp 192.168.1.1:53 <- 192.168.1.17:35486       SINGLE:MULTIPLE
           age 00:00:33, expires in 00:00:00, 1:1 pkts, 61:77 bytes, rule 181
           id: 010000005cd28c21 creatorid: b13ad8d2
        igb4 udp 107.20.134.235:32100 <- 192.168.1.18:10092       MULTIPLE:MULTIPLE
        --
        igb4 udp 114.55.218.176:32100 <- 192.168.1.17:25029       NO_TRAFFIC:SINGLE
           age 00:00:33, expires in 00:00:27, 1:0 pkts, 32:0 bytes, rule 181
           id: 010000005cd28c22 creatorid: b13ad8d2
        igb5 udp xxx:41955 (192.168.1.18:10092) -> 107.20.134.235:32100       MULTIPLE:MULTIPLE
        --
        igb5 udp xxx:10147 (192.168.1.17:25029) -> 114.55.218.176:32100       SINGLE:NO_TRAFFIC
           age 00:00:33, expires in 00:00:27, 1:0 pkts, 32:0 bytes, rule 141
           id: 010000005cd28c23 creatorid: b13ad8d2
        igb4 udp 2a02:8071:889:c500:4262:31ff:fe07:2bdc[53] <- 2a02:8071:889:c500:f525:878c:30fa:1bb5[50603]       SINGLE:MULTIPLE
        --
        igb4 udp 47.91.90.222:32100 <- 192.168.1.17:25029       SINGLE:MULTIPLE
           age 00:00:33, expires in 00:00:00, 1:1 pkts, 32:48 bytes, rule 181
           id: 010000005cd28c24 creatorid: b13ad8d2
        igb4 udp 192.168.1.1:53 <- 192.168.1.122:53655       SINGLE:MULTIPLE
        --
        igb5 udp xxx:51011 (192.168.1.17:25029) -> 47.91.90.222:32100       MULTIPLE:SINGLE
           age 00:00:33, expires in 00:00:00, 1:1 pkts, 32:48 bytes, rule 141
           id: 010000005cd28c25 creatorid: b13ad8d2
        igb4 udp 114.55.218.176:32100 <- 192.168.1.18:21763       NO_TRAFFIC:SINGLE
        

        Netgate 6100 MAX

        DerelictD 1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate @mrsunfire
          last edited by

          @mrsunfire OK, help me out. Which state should not be there?

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • M
            mrsunfire
            last edited by

            All of the igb5 (WAN) connections from or to the 192.168.1.17.

            Netgate 6100 MAX

            DerelictD 1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate @mrsunfire
              last edited by

              @mrsunfire Pick one.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • M
                mrsunfire
                last edited by

                @mrsunfire said in Alias firewall block rule not blocked!:

                igb5 udp xxx:10147 (192.168.1.17:25029) -> 114.55.218.176:32100 SINGLE:NO_TRAFFIC
                age 00:00:33, expires in 00:00:27, 1:0 pkts, 32:0 bytes, rule 141
                id: 010000005cd28c23 creatorid: b13ad8d2

                igb5 udp xxx:10147 (192.168.1.17:25029) -> 114.55.218.176:32100 SINGLE:NO_TRAFFIC
                age 00:00:33, expires in 00:00:27, 1:0 pkts, 32:0 bytes, rule 141
                id: 010000005cd28c23 creatorid: b13ad8d2

                Netgate 6100 MAX

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  @mrsunfire said in Alias firewall block rule not blocked!:

                  pfctl -vvsr | grep -A3 '^@141('

                  pfctl -vvsr | grep -A3 '^@181('

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • M
                    mrsunfire
                    last edited by mrsunfire

                    @Derelict said in Alias firewall block rule not blocked!:

                    pfctl -vvsr | grep -A3 '^@141('

                    @141(1000011161) pass out route-to (igb5 134.3.212.1) inet from xxx to ! 134.3.212.0/22 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                      [ Evaluations: 1218      Packets: 12419     Bytes: 8152153     States: 167   ]
                      [ Inserted: pid 49753 State Creations: 183   ]
                    @142(1000011162) pass out route-to (igb5 fe80::201:5cff:fe6b:e046) inet6 from 2a02:8071:xxx to ! 2a02:8071:xxx::/56 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                    

                    Netgate 6100 MAX

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      [insert final jeopardy theme here.]

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • M
                        mrsunfire
                        last edited by

                        Right now the alias is working again and I can't get it to not work. I did nothing but now it is blocking. Sorry, I don't see the error there and will give it a try again in the future. Thanks for your help so far.

                        Netgate 6100 MAX

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          What was rule 181 in that rule set? Inquiring minds want to know!

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • M
                            mrsunfire
                            last edited by mrsunfire

                            This is a rule that passed the traffic from one client on LAN to my Cable Modem interface:

                            @181(1526110841) pass in quick on igb4 route-to (igb5 134.3.212.1) inet from 192.168.1.20 to 192.168.100.1 flags S/SA keep state label "USER_RULE: PC TC4400 Modem"
                              [ Evaluations: 1048      Packets: 0         Bytes: 0           States: 0     ]
                              [ Inserted: pid 79204 State Creations: 0     ]
                            @182(1417115627) pass in quick on igb4 inet from 192.168.1.0/24 to any flags S/SA keep state label "USER_RULE: Allow ALL IPv4"
                            

                            Netgate 6100 MAX

                            1 Reply Last reply Reply Quote 0
                            • DerelictD
                              Derelict LAYER 8 Netgate
                              last edited by

                              @mrsunfire said in Alias firewall block rule not blocked!:

                              Does pfctl -vvsr | grep -A3 1526110841 show anything more?

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                Are you mixing and matching current data with old?

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mrsunfire
                                  last edited by

                                  Right now the old config works. But I post it anyways:

                                  @181(1526110841) pass in quick on igb4 route-to (igb5 134.3.212.1) inet from 192.168.1.20 to 192.168.100.1 flags S/SA keep state label "USER_RULE: PC TC4400 Modem"
                                    [ Evaluations: 946       Packets: 0         Bytes: 0           States: 0     ]
                                    [ Inserted: pid 41920 State Creations: 0     ]
                                  @182(1417115627) pass in quick on igb4 inet from 192.168.1.0/24 to any flags S/SA keep state label "USER_RULE: Allow ALL IPv4"
                                  

                                  Netgate 6100 MAX

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    Are the states that you posted citing rule 181 old data or new?

                                    We need to be looking at the same rule set as the state table or we are just wasting time.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      mrsunfire
                                      last edited by mrsunfire

                                      They were the same rule set. I restored the config againto that point. But this time its working.

                                      I will try to get the problem up again and post the same things again...

                                      Netgate 6100 MAX

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        mrsunfire
                                        last edited by mrsunfire

                                        OK I've now checked the latest config again and now here are connections to WAN, I'm really confused:

                                        pf2.jpg

                                        igb4 udp 114.55.218.176:32100 <- 192.168.1.17:10085       MULTIPLE:MULTIPLE
                                           age 00:28:43, expires in 00:00:48, 54:33 pkts, 3840:1352 bytes, rule 175
                                           id: 000000005cd29094 creatorid: 732cab7f
                                        igb5 udp xxx:65411 (192.168.1.17:10085) -> 114.55.218.176:32100       MULTIPLE:MULTIPLE
                                           age 00:28:43, expires in 00:00:48, 54:33 pkts, 3840:1352 bytes, rule 139
                                           id: 000000005cd29095 creatorid: 732cab7f
                                        lo0 tcp 127.0.0.1:6379 <- 127.0.0.1:26058       ESTABLISHED:ESTABLISHED
                                        --
                                        igb4 udp 107.20.134.235:32100 <- 192.168.1.17:10085       MULTIPLE:MULTIPLE
                                           age 00:28:43, expires in 00:00:48, 54:54 pkts, 3840:2208 bytes, rule 175
                                           id: 000000005cd29098 creatorid: 732cab7f
                                        igb5 udp xxx:17644 (192.168.1.17:10085) -> 107.20.134.235:32100       MULTIPLE:MULTIPLE
                                           age 00:28:43, expires in 00:00:48, 54:54 pkts, 3840:2208 bytes, rule 139
                                           id: 000000005cd29099 creatorid: 732cab7f
                                        lo0 tcp ::1[3493] <- ::1[26068]       ESTABLISHED:ESTABLISHED
                                        --
                                        igb4 udp 47.91.90.222:32100 <- 192.168.1.17:10085       MULTIPLE:MULTIPLE
                                           age 00:23:35, expires in 00:00:48, 45:41 pkts, 3200:1680 bytes, rule 182
                                           id: 000000005cd295e5 creatorid: d0585f4d
                                        igb5 udp xxx:46591 (192.168.1.17:10085) -> 47.91.90.222:32100       MULTIPLE:MULTIPLE
                                           age 00:23:35, expires in 00:00:48, 45:41 pkts, 3200:1680 bytes, rule 141
                                           id: 000000005cd295e6 creatorid: d0585f4d
                                        igb3 udp 255.255.255.255:4944 <- 0.0.0.0:6134       NO_TRAFFIC:SINGLE
                                        --
                                        igb4 udp 192.168.1.1:53 <- 192.168.1.17:44606       SINGLE:MULTIPLE
                                           age 00:00:06, expires in 00:00:24, 1:1 pkts, 59:128 bytes, rule 182
                                           id: 000000005cd2a1af creatorid: d0585f4d
                                        igb4.200 udp 8.8.8.8:53 <- 10.0.1.5:11824       SINGLE:MULTIPLE
                                        

                                        Netgate 6100 MAX

                                        1 Reply Last reply Reply Quote 0
                                        • DerelictD
                                          Derelict LAYER 8 Netgate
                                          last edited by

                                          So what are rules 175, 139, 182, and 141 in the current rule set?

                                          Chattanooga, Tennessee, USA
                                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            mrsunfire
                                            last edited by mrsunfire

                                            175 is forcing a VOIP client to use a specific gateway (Multi WAN config).

                                            @175(10000001) pass in quick on igb4 inet proto udp from 192.168.1.19 to <negate_networks:2> keep state label "NEGATE_ROUTE: Negate policy routing for destination"
                                              [ Evaluations: 1632      Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: pid 41920 State Creations: 0     ]
                                            @176(1524056818) pass in quick on igb4 route-to (igb5 134.3.212.1) inet proto tcp from 192.168.1.19 to any flags S/SA keep state label "USER_RULE: VOIP UM Gateway"
                                            
                                            @139(1000011065) pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
                                              [ Evaluations: 16781     Packets: 3841      Bytes: 285161      States: 0     ]
                                              [ Inserted: pid 41920 State Creations: 13    ]
                                            @140(1000011066) pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
                                            
                                            @182(1417115627) pass in quick on igb4 inet from 192.168.1.0/24 to any flags S/SA keep state label "USER_RULE: Allow ALL IPv4"
                                              [ Evaluations: 2225      Packets: 471566    Bytes: 563093528   States: 42    ]
                                              [ Inserted: pid 41920 State Creations: 1750  ]
                                            @183(1525366696) pass in quick on igb4 inet6 from 2a02:8071:xxx::/64 to any flags S/SA keep state label "USER_RULE: Allow ALL IPv6"
                                            
                                            @141(1000011161) pass out route-to (igb5 134.3.212.1) inet from xxx to ! 134.3.212.0/22 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                                              [ Evaluations: 8760      Packets: 477427    Bytes: 563273095   States: 76    ]
                                              [ Inserted: pid 41920 State Creations: 4639  ]
                                            @142(1000011162) pass out route-to (igb5 fe80::201:5cff:fe6b:e046) inet6 from 2a02:8071:xxx to ! 2a02:8071:800::/56 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                                            

                                            Netgate 6100 MAX

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.