• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Firewall logging

Scheduled Pinned Locked Moved Firewalling
7 Posts 4 Posters 2.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V
    vmaxx
    last edited by May 24, 2017, 3:02 PM

    Hi, new to pfSense and have a logging question. I am basically trying to follow who's doing what. Sometimes in the firewall log I see a LAN entry from a specific IP and its external destination, then I see the corresponding entry for the WAN interface going to the same destination and port. This is what I would expect, but that's not always the case. Obviously if its blocked I wouldn't expect to see anything on the WAN interface and I am sure pfSense has some traffic of its own. My concern is when I see WAN entries as the source (allowed) going to external IPs with no corresponding LAN entries. What are they and where are they from?

    Am I missing something or should there be a one for one entry when a machine on my network makes an external connection, one for the LAN interface and the WAN interface?

    Thanks

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by May 24, 2017, 3:23 PM

      what are you logging.. Out of the box pfsense does not log any traffic outbound from the lan.  Nor would it log any outbound connections from the wan.

      Pfsense itself checks if there is new version, packages, etc.  So its quite possible traffic you are seeing could be from pfsense itself.

      Would need to understand what logging you setup and what your seeing exactly to discuss in more detail.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • V
        vmaxx
        last edited by May 24, 2017, 8:12 PM

        Thanks for the info. I have the default rule to log traffic so I can see as much as possible. I actually think a lot of it is pfSense itself. I see a lot of port 53. It seems that there is usually a large chunk of WAN entries at the same time. Going through the logs just to make sure I understand how things work. I have not had this level of granularity before. Just newness I guess.

        Thanks again for the help

        1 Reply Last reply Reply Quote 0
        • P
          pfBasic Banned
          last edited by May 25, 2017, 12:53 AM

          If your network is small enough try assigning static IPs and group them into aliases as necessary.
          You can also write aliases for ports as necessary.

          Basically,  try writing more specific rules to keep track of the stuff you want to know.  As you have seen,  logging everything is may more noise than useful information.

          1 Reply Last reply Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator
            last edited by May 25, 2017, 4:42 PM May 25, 2017, 10:34 AM

            setting the default rule to log would not log what is going out the wan.. It would just log what hits the pfsense LAN and if allowed or blocked with source and destination..

            Yes there is going to be lots of dns requests (53) when you surf or even go to 1 site..

            Out of the box pfsense uses a resolver (unbound).. So when some client behind pfsense asks pfsense dns for www.google.com and it has not already been cached.. The resolver (pfsense itself) walks down the tree from roots..

            Hey root nameserver what is the ns for .com
            Hey .com ns what is the ns for google.com
            Hey google.com ns what is the IP address of www.google.com

            Now think about when you hit some typical website how many domains are used on it.. And then walking down the tree for all those fqdn..  Keep in mind that this is only the first time, after something has been looked up it will be cached for the length of the ttl of that record.

            So yeah normal traffic is going to create a bit of dns traffic out the wan from the pfsense wan IP and will not show in your state table with a internal IP that created it.

            edit:  Modified wording to reflect what I meant to say ;)  See next 2 posts..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • K
              kpa
              last edited by May 25, 2017, 1:47 PM

              @johnpoz:

              So yeah normal traffic is going to create a bit of dns traffic out the wan from the pfsense wan IP and will not show in your state table.

              What??? Unless you mean something very different than what I'm thinking you mean you're very wrong here. Any traffic going out via the WAN is going to create a state because that's what PF does unless you explicitly tell it not to create a state for matched traffic with "no state". Even if the default policy rule of allowing outgoing traffic is not directly shown there is still a rule that matches that traffic and that rule uses "keep state", for example from my system /tmp/rules.debug:

              
              # let out anything from the firewall host itself and decrypted IPsec traffic
              pass out  inet all keep state allow-opts tracker 1000004765 label "let out anything IPv4 from firewall host itself"
              
              
              1 Reply Last reply Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator
                last edited by May 25, 2017, 4:37 PM

                @kpa, you are correct it would be in the state table

                What I meant is it won't show in in his state table with a source IP from the device on the inside.. Since the traffic would be generated by pfsense itself..  Bad wording on my part!  Thanks for calling me on it…

                So for example here is state created by my internal box going out to the internet
                24.13.publicIP:41202 (192.168.9.100:59308) -> 40.127.97.225:80

                While this is created by the firewall
                24.13.publicIP:56717 -> 162.208.119.40:443

                Which is a connection to files.pfsense.org

                I should of worded that more clear - thanks!

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                7 out of 7
                • First post
                  7/7
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                  This community forum collects and processes your personal information.
                  consent.not_received