Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Floating vs Interface rules processing order

    Scheduled Pinned Locked Moved Firewalling
    41 Posts 5 Posters 8.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      @chriva said in Floating vs Interface rules processing order:

      I think the evaluation order you said:

      No that is not the evaluation order.. Not sure how much clearer Derelict can be.

      Rules are processed in order whether or not quick is set.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • T
        turrican64 @chriva
        last edited by turrican64

        @chriva

        From Derelict good explanation I can say the following

        Processing order:
        1.Floating Rules (Quick + NON Quick)
        2.Interface Group Rules (always Quick)
        3.Interface Rules (always Quick)

        However Quick flag reverses the behavior of “first match wins” to be “last match wins”.
        Therefore if there is another rule after the Quick rule which matches that will take effect not the Quick one.

        And as you say MATCH applied immediately and evaluation continues for the rest of the ruleset.

        C 1 Reply Last reply Reply Quote 0
        • T
          turrican64
          last edited by turrican64

          And statement from the pfsense book that:

          "Without Quick checked, the rule will only take effect if no other rules match the traffic"

          is not applicable to MATCH rules.

          1 Reply Last reply Reply Quote 0
          • C
            chriva @turrican64
            last edited by

            After re-reading Derelict comment it is much clearer.
            Let me know if i'm right or not.

            All rules are read and parsed in order of the ruleset.
            The rule order is floating > group > interface
            All match rules should apply before pass/block rules

            For match rules (last match case, all rules should be read)
            quick flag is unrelevant
            if there is a match set the modifier (queue/tag) to the one dictated by this rule
            Read Next rule
            Loop until there are no more rules.
            Apply the modifier.

            For pass/block rules (first match case, maybe not all the rules needs to be read)
            If there is a match and rule is quick, stop reading and apply action.
            If there is a match but rule is not quick save the action (only first time).
            Read next rule.
            Loop until there are no more rules.
            If there is a saved action apply the action.

            @turrican64

            However Quick flag reverses the behavior of “first match wins” to be “last match wins”.
            Therefore if there is another rule after the Quick rule which matches that will takes effect not the Quick one.

            Sorry, but I don't think this is correct
            Try
            quick floating allow ping
            quick floating deny ping

            Ping will be allowed
            (If there is a match on a quick rule there is not further evaluation.)

            T 1 Reply Last reply Reply Quote 0
            • T
              turrican64 @chriva
              last edited by turrican64

              @chriva

              So sorry I meant the other way around

              However Without Quick flag reverses the behavior of “first match wins” to be “last match wins”.
              Therefore if there is another rule after the NON Quick rule which matches that will take effect not the NON Quick one.

              1 Reply Last reply Reply Quote 0
              • kiokomanK
                kiokoman LAYER 8
                last edited by

                something like this ?
                Diagram.jpg

                ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                Please do not use chat/PM to ask for help
                we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by Derelict

                  All rules without quick set do is modify the default treatment of the packet should nothing else further down in the rule set change it.

                  It's really that simple.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • T
                    turrican64 @Derelict
                    last edited by turrican64

                    @Derelict said in Floating vs Interface rules processing order:

                    block in log inet all tracker 1000000103 label "Default deny rule IPv4"
                    block out log inet all tracker 1000000104 label "Default deny rule IPv4"
                    

                    These are very high in the rule set and do not have quick set. They set every packet to be blocked in or out of any interface. When all the other rules have been processed and the end of the rule set is reached and no other rule has changed the behavior and passed or blocked it, then that action is taken and the packet is dropped.

                    Based on the above if I create only 1 rule for example

                    allow in dst 10.0.0.1 Quick:NO
                    

                    will never take effect because the also non quick rule

                    block in log inet all tracker 1000000103 label "Default deny rule IPv4
                    

                    is higher in the rule set (“last match wins”).
                    Correct?

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Man...

                      block in log inet all tracker 1000000103 label "Default deny rule IPv4

                      That sets the default deny on all traffic.

                      Then, further down the rule set:

                      allow in dst 10.0.0.1 Quick:NO

                      That changes that behavior.

                      As long as nothing further down the rule set matches and changes that allow, it will be passed.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • T
                        turrican64
                        last edited by

                        Ok
                        block in log inet all tracker 1000000103 label "Default deny rule IPv4
                        is at the very top of the ruleset.

                        Clear

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          cat /tmp/rules.debug

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.