Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Solved] Firewall Log entries flooded for IPv6/:5353

    Scheduled Pinned Locked Moved General pfSense Questions
    21 Posts 6 Posters 11.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Same cause. The link-local address is neither in LANnet nor in All_Local_Subnets unless you have specifically added an entry for it. fe80::/10

      Steve

      JKnottJ R 2 Replies Last reply Reply Quote 1
      • JKnottJ
        JKnott @stephenw10
        last edited by

        @stephenw10

        Perhaps I'm missing something, but why would you have rules for something that's not supposed to leave the local link?

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        P 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Only reason to create such rules would be to no log the traffic jknott..

          @rsaanon that wule not going to work because ALL_local_Subnets is not all your fe80 space (link_local)..

          Do what stephen suggests use fe80::/10 as your source for that rule..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • kiokomanK
            kiokoman LAYER 8
            last edited by

            yup .. to no log the traffic.. 😂

            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
            Please do not use chat/PM to ask for help
            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              not log - T seems to have gotten dropped, I blame the keyboard ;)

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              JKnottJ 1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @johnpoz
                last edited by

                @johnpoz said in Firewall Log entries flooded for IPv6/:5353:

                I blame the keyboard ;)

                Yeah, right! 😉

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 0
                • R
                  rsaanon @kiokoman
                  last edited by

                  @kiokoman Floating rule so that I only have to create one rule for all interfaces instead of defining Pass rule for :5353 on each of the interfaces. As you can see from the previous snapshot, the firewall is logging traffic destined for ff02::fb:5353 across several interfaces (LAN,IOT,KIDS, etc.)

                  1 Reply Last reply Reply Quote 0
                  • R
                    rsaanon @stephenw10
                    last edited by

                    @stephenw10 When I try to create a Network alias as "fe80 /10" and save it, the alias reverts back to "fe80/32"

                    fe5cea7b-5c08-48ea-9f97-feea86b7a532-image.png

                    I would like to create one floating rule for all interfaces that allows for all link-local fe80::* instead of defining link-local pass rule per interface.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      its fe80::/10

                      And why do you need an alias you can just put that directly in the rule..

                      fe80.jpg

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      R 1 Reply Last reply Reply Quote 1
                      • R
                        rsaanon @johnpoz
                        last edited by

                        @johnpoz Initially, I had wanted to create an alias to put in all link-local addresses and then use that alias when defining the fw rules. Now with fe80/10 there's no need for an alias.

                        What I was missing was the :: when I was creating the alias or when I was trying to directly put fe80::/10 in the fw rule. Unfortunately, in this instance I cannot blame the keyboard 😜 🖖

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          rsaanon @rsaanon
                          last edited by

                          @rsaanon btw, how do I mark this thread as resolved?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            There's no formal way of doing it. You can edit the title and prefix it [solved]. Or I can.

                            R 1 Reply Last reply Reply Quote 0
                            • R
                              rsaanon @stephenw10
                              last edited by

                              @stephenw10 @johnpoz Thank you for helping me in getting this issue resolved. Am I able to donate something-something or at the very least buy you guys some beer :-)

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by johnpoz

                                Best thing to do is just pay it forward, see if there is someone you can help on the forums.. If you feel you must donate - then you can donate to freebsd.

                                https://www.freebsd.org/donations/

                                Or pick a worthy charity - anything related to helping with covid-19 would prob be a good choice with the current situation..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 2
                                • P
                                  Patch @JKnott
                                  last edited by

                                  @jknott said in [Solved] Firewall Log entries flooded for IPv6/:5353:

                                  Perhaps I'm missing something, but why would you have rules for something that's not supposed to leave the local link?

                                  @johnpoz said in [Solved] Firewall Log entries flooded for IPv6/:5353:

                                  Only reason to create such rules would be to no log the traffic jknott..

                                  That makes sense but why create pass rules. To prevent the default block rule logging, should not we be creating an equivalent block rule but without logging enabled?

                                  However I'm rather new to this and not sure if that would break some function I'm not aware of. Hence my question, where should the block ff02::fb 5353 go to just block the logging but not change the default pfsense filtering

                                  • WAN outgoing or
                                  • floating rule on all or perhaps all LAN interfaces
                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @Patch
                                    last edited by johnpoz

                                    @patch You can create whatever rule you want be it allow or block or reject - and set it not to log.. But unless you were using something like avahi to pass on the mdns query - pfsense really has no use for such traffic, and wouldn't be doing anything with it. If you allowed it.

                                    Pfsense is clearly blocking it already, what interface your seeing the traffic on would be the interface you create the rule on to block it and "not" log it.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 1
                                    • A anthonys referenced this topic on
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.