Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Floating vs Interface rules processing order

    Scheduled Pinned Locked Moved Firewalling
    41 Posts 5 Posters 7.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      chriva
      last edited by

      As i understand
      Interface rules are automatically Quick flagged
       "Quick" in floating rules means "evaluate before group and interfacce rules - early rules".
      "Non Quick floating" means evaluate After group and interface rules - late rules".

      I think the evaluation order you said:
      1.Floating Rules (Quick)
      2.Interface Group Rules (always Quick)
      3.Interface Rules (always Quick)
      4.Floating Rules (NON Quick)

      Is the correct one

      If you want to check, disabile LAN rule and let quick unchecked on floating rule.
      Traffic should pass.

      Match option:
      Match + Quick does not work ( I think the flag quick is useless with match and does not make any difference in this kind of action)
      Match action rules don't stop packet evaluation, packet tagging or packet queueing, they are all evalued consecutively before any other pass/block rule .

      So about the original question:

      • ping is allowed without quick floating because lan rules comes first.
      • ping is blocked with quick floating because quick floating comes first.

      Regards.

      T 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        @chriva said in Floating vs Interface rules processing order:

        I think the evaluation order you said:

        No that is not the evaluation order.. Not sure how much clearer Derelict can be.

        Rules are processed in order whether or not quick is set.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • T
          turrican64 @chriva
          last edited by turrican64

          @chriva

          From Derelict good explanation I can say the following

          Processing order:
          1.Floating Rules (Quick + NON Quick)
          2.Interface Group Rules (always Quick)
          3.Interface Rules (always Quick)

          However Quick flag reverses the behavior of “first match wins” to be “last match wins”.
          Therefore if there is another rule after the Quick rule which matches that will take effect not the Quick one.

          And as you say MATCH applied immediately and evaluation continues for the rest of the ruleset.

          C 1 Reply Last reply Reply Quote 0
          • T
            turrican64
            last edited by turrican64

            And statement from the pfsense book that:

            "Without Quick checked, the rule will only take effect if no other rules match the traffic"

            is not applicable to MATCH rules.

            1 Reply Last reply Reply Quote 0
            • C
              chriva @turrican64
              last edited by

              After re-reading Derelict comment it is much clearer.
              Let me know if i'm right or not.

              All rules are read and parsed in order of the ruleset.
              The rule order is floating > group > interface
              All match rules should apply before pass/block rules

              For match rules (last match case, all rules should be read)
              quick flag is unrelevant
              if there is a match set the modifier (queue/tag) to the one dictated by this rule
              Read Next rule
              Loop until there are no more rules.
              Apply the modifier.

              For pass/block rules (first match case, maybe not all the rules needs to be read)
              If there is a match and rule is quick, stop reading and apply action.
              If there is a match but rule is not quick save the action (only first time).
              Read next rule.
              Loop until there are no more rules.
              If there is a saved action apply the action.

              @turrican64

              However Quick flag reverses the behavior of “first match wins” to be “last match wins”.
              Therefore if there is another rule after the Quick rule which matches that will takes effect not the Quick one.

              Sorry, but I don't think this is correct
              Try
              quick floating allow ping
              quick floating deny ping

              Ping will be allowed
              (If there is a match on a quick rule there is not further evaluation.)

              T 1 Reply Last reply Reply Quote 0
              • T
                turrican64 @chriva
                last edited by turrican64

                @chriva

                So sorry I meant the other way around

                However Without Quick flag reverses the behavior of “first match wins” to be “last match wins”.
                Therefore if there is another rule after the NON Quick rule which matches that will take effect not the NON Quick one.

                1 Reply Last reply Reply Quote 0
                • kiokomanK
                  kiokoman LAYER 8
                  last edited by

                  something like this ?
                  Diagram.jpg

                  ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                  Please do not use chat/PM to ask for help
                  we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                  Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by Derelict

                    All rules without quick set do is modify the default treatment of the packet should nothing else further down in the rule set change it.

                    It's really that simple.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • T
                      turrican64 @Derelict
                      last edited by turrican64

                      @Derelict said in Floating vs Interface rules processing order:

                      block in log inet all tracker 1000000103 label "Default deny rule IPv4"
                      block out log inet all tracker 1000000104 label "Default deny rule IPv4"
                      

                      These are very high in the rule set and do not have quick set. They set every packet to be blocked in or out of any interface. When all the other rules have been processed and the end of the rule set is reached and no other rule has changed the behavior and passed or blocked it, then that action is taken and the packet is dropped.

                      Based on the above if I create only 1 rule for example

                      allow in dst 10.0.0.1 Quick:NO
                      

                      will never take effect because the also non quick rule

                      block in log inet all tracker 1000000103 label "Default deny rule IPv4
                      

                      is higher in the rule set (“last match wins”).
                      Correct?

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        Man...

                        block in log inet all tracker 1000000103 label "Default deny rule IPv4

                        That sets the default deny on all traffic.

                        Then, further down the rule set:

                        allow in dst 10.0.0.1 Quick:NO

                        That changes that behavior.

                        As long as nothing further down the rule set matches and changes that allow, it will be passed.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • T
                          turrican64
                          last edited by

                          Ok
                          block in log inet all tracker 1000000103 label "Default deny rule IPv4
                          is at the very top of the ruleset.

                          Clear

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            cat /tmp/rules.debug

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.