Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Rule syntax error after 2.4.4 upgrade to 2.4.5

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    4 Posts 2 Posters 461 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      DarkBlade
      last edited by

      Hopefully a simple issue...

      Having upgraded to 2.4.5 today, my PFsense is reporting:

      there were error(s) loading the rules: /tmp/rules.debug:110: syntax error - The line in question reads [110]: 
        rdr on { em1 openvpn } proto icmp from 192.168.200.0/24 to 192.168.200.0/24 port any -> $PFSense
      

      The line in the rules.debug file reads:

      # Reflection redirect
      rdr on { em1 openvpn } proto icmp from 192.168.200.0/24 to 192.168.200.0/24 port any -> $PFSense
      

      PFSense is an alias for the PFsense LAN IP.

      Anyone have any ideas what the issue is? Thanks.

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @DarkBlade
        last edited by Gertjan

        @DarkBlade said in Rule syntax error after 2.4.4 upgrade to 2.4.5:

        ->

        Some how, this one made it onto the config.xml

        Delete and re create the rule ? Or just the comment ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • D
          DarkBlade
          last edited by DarkBlade

          I've commented out the rule for now.
          I can't seem to see which rule this applies to (there are no rules under the default OpenVPN tab, but I do have a my own VPN tab under rules and I suspect it is the basic pass rule for ICMP)
          I've re-created my 2.4.4 build from backup and there seems to be no difference in the rules via the GUI.
          Can't remember how I tested the rule when it was setup.
          I have noticed some differences in this section of the rules.debug between 2.4.4 and 2.4.5. Not sure if there is a slight bug here?

          This is the section in the rules.debug from 2.4.4

          # Load balancing anchor
          rdr-anchor "relayd/*"
          # TFTP proxy
          rdr-anchor "tftp-proxy/*"
          # NAT Inbound Redirects
          rdr on ovpns1 proto icmp from 192.168.200.0/24 to any -> $PFSense
          # Reflection redirect
          rdr on { em1 openvpn } proto icmp from 192.168.200.0/24 to 192.168.200.0/24 -> $PFSense
          # UPnPd rdr anchor
          rdr-anchor "miniupnpd"
          

          This is the section in after the upgrade to 2.4.5.

          # Load balancing anchor
          rdr-anchor "relayd/*"
          # TFTP proxy
          rdr-anchor "tftp-proxy/*"
          # NAT Inbound Redirects
          rdr on pppoe0 proto tcp from any to 91.135.4.5 port 554 -> $NVR
          # Reflection redirect
          rdr on { em1 openvpn } proto tcp from any to 91.135.4.5 port 554 -> $NVR
          rdr on pppoe0 proto tcp from any to 91.135.4.5 port 443 -> $PFSense port 5900
          # Reflection redirect
          rdr on { em1 openvpn } proto tcp from any to 91.135.4.5 port 443 -> $PFSense port 5900
          rdr on pppoe0 proto tcp from any to 91.135.4.5 port 992 -> $Wall_e
          # Reflection redirect
          rdr on { em1 openvpn } proto tcp from any to 91.135.4.5 port 992 -> $Wall_e
          rdr on ovpns1 proto icmp from 192.168.200.0/24 to any -> $PFSense
          # Reflection redirect
          rdr on { em1 openvpn } proto icmp from 192.168.200.0/24 to 192.168.200.0/24 port any -> $PFSense
          rdr on pppoe0 proto tcp from any to 91.135.4.5 port 5555 -> $Wall_e
          # Reflection redirect
          rdr on { em1 openvpn } proto tcp from any to 91.135.4.5 port 5555 -> $Wall_e
          # UPnPd rdr anchor
          rdr-anchor "miniupnpd"
          
          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by Gertjan

            The extra rules used by 2.4.5 use labels like $NVR, $PFSense, $Wall_e.
            These are not pfSense itself.

            Reset your pfSense to default, make 'pppoe' work (and stop there) and these labels will be gone.

            Looks like these rules are part of NAT (?) rules on the pppoe interface that didn't exists when you were using 2.4.4.

            edit : just in case : NATting, of course, should not be used to access things like pfSense GUI or a NVR.
            Use OpenVPN server for a secured connection. Then you can access all your local devices without any NATting.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.