Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    unexpected outbound traffic blockage

    Firewalling
    5
    17
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @robMarchetti
      last edited by viragomann

      @robmarchetti
      You should add a description to each custom rule, otherwise you only can see the ID in the log.

      Also post the whole log screen including the protocol, please.

      R 1 Reply Last reply Reply Quote 0
      • R
        robMarchetti @viragomann
        last edited by

        @viragomann Thanks! I didn't know you see which rule is causing the block. After looking at the logs it is rule ID 1000104533 causing the problem, but that ID doesn't match any of the rules I have on any interface.

        b08e0289-dca9-44b8-9bc8-a9074f2c367a-image.png

        V 1 Reply Last reply Reply Quote 0
        • R
          robMarchetti @viragomann
          last edited by

          @viragomann Good point, I'll go in add a description to the firewall rules and take a screenshot of the log after.

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @robMarchetti
            last edited by

            @robmarchetti

            @viragomann said in unexpected outbound traffic blockage:

            Also post the whole log screen including the protocol, please.

            Possibly it is an out-of-state block.

            1 Reply Last reply Reply Quote 0
            • V
              viragomann @robMarchetti
              last edited by

              @robmarchetti

              If you only have the rule id you can use pfctl to display the respective rule:

              pfctl -vvsr | grep <rule-id>
              
              R 1 Reply Last reply Reply Quote 0
              • R
                robMarchetti @viragomann
                last edited by

                @viragomann It looks like the protocols for the blocked outbound LAN traffic are TCP:PA, and TCP:FPA. I've never seen that before, but I'm guessing those might be invalid or fragmented packets?

                194691ce-b438-47af-a357-080ae18e5dd5-image.png

                Eric-LTSE V 3 Replies Last reply Reply Quote 0
                • Eric-LTSE
                  Eric-LTS @robMarchetti
                  last edited by

                  @robmarchetti https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html

                  This may be what you're looking for

                  1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @robMarchetti
                    last edited by

                    @robmarchetti
                    Yes, all TCP flags other than SYN means that pfSense has no state for it in its state table.
                    Maybe the connection was already closed due to timeout. Maybe you have a sort of an asymmetric routing issue.

                    R 1 Reply Last reply Reply Quote 1
                    • Eric-LTSE
                      Eric-LTS @robMarchetti
                      last edited by

                      @robmarchetti

                      Did you make any changes in System > Advanced > Firewall & NAT > State Timeouts?

                      Also, are you otherwise having any actual outbound issues or were you just noticing the logs?

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        robMarchetti @viragomann
                        last edited by

                        @viragomann Thanks for your help, after looking at the literature I realize now that what I saw in the logs is actually normal as pfsense drops out of state traffic by default. I had a layer 8 problem!

                        S 1 Reply Last reply Reply Quote 0
                        • R
                          robMarchetti @Eric-LTS
                          last edited by

                          @eric-lts Nope, the state timeout settings are all set to default. And the network functions perfectly well, I just didn't understand what I saw in the logs. Thanks for the help.

                          1 Reply Last reply Reply Quote 0
                          • S
                            SteveITS Galactic Empire @robMarchetti
                            last edited by

                            @robmarchetti said in unexpected outbound traffic blockage:

                            pfsense drops out of state traffic by default

                            We normally uncheck the "Log packets matched from the default block rules in the ruleset" log option, since there can be a lot, and just turn that on if debugging new rules.

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.