Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    unexpected outbound traffic blockage

    Firewalling
    5
    17
    235
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      robMarchetti last edited by

      I recently changed my home firewall over from untangle to pfsense, which I like much better. However, after reviewing the firewall logs I see a lot of outbound traffic being blocked even though it should allow all outbound. Does anyone have any experience with this?

      471efdae-fcc8-4104-b707-f18cad8a9449-image.png

      KOM V 2 Replies Last reply Reply Quote 0
      • KOM
        KOM @robMarchetti last edited by

        @robmarchetti Do you have any packages installed such as pfBlocker? What are your LAN rules?

        R 1 Reply Last reply Reply Quote 0
        • V
          viragomann @robMarchetti last edited by

          @robmarchetti
          Check out which rule is responsible for the block.
          You may also add the rule column in the log settings at "Where to show rule descriptions".

          R 1 Reply Last reply Reply Quote 0
          • R
            robMarchetti @KOM last edited by

            @kom No I haven't installed any packages, it is just the base pfsense image. LAN rules are below.

            c897224e-df9c-4bc0-afca-111d0f89f878-image.png

            Eric-LTS V 2 Replies Last reply Reply Quote 0
            • Eric-LTS
              Eric-LTS @robMarchetti last edited by

              @robMarchetti

              That looks normal, you can see states are going over the allow all and so long as DNS is configured correctly on the pfSense that should work fine.

              Curious though about the OP screenshot where you were looking at those blocks. Status > System Logs > Firewall > Normal View will show the rule in the log that is blocking said traffic.

              1 Reply Last reply Reply Quote 0
              • V
                viragomann @robMarchetti last edited by viragomann

                @robmarchetti
                You should add a description to each custom rule, otherwise you only can see the ID in the log.

                Also post the whole log screen including the protocol, please.

                R 1 Reply Last reply Reply Quote 0
                • R
                  robMarchetti @viragomann last edited by

                  @viragomann Thanks! I didn't know you see which rule is causing the block. After looking at the logs it is rule ID 1000104533 causing the problem, but that ID doesn't match any of the rules I have on any interface.

                  b08e0289-dca9-44b8-9bc8-a9074f2c367a-image.png

                  V 1 Reply Last reply Reply Quote 0
                  • R
                    robMarchetti @viragomann last edited by

                    @viragomann Good point, I'll go in add a description to the firewall rules and take a screenshot of the log after.

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @robMarchetti last edited by

                      @robmarchetti

                      @viragomann said in unexpected outbound traffic blockage:

                      Also post the whole log screen including the protocol, please.

                      Possibly it is an out-of-state block.

                      1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @robMarchetti last edited by

                        @robmarchetti

                        If you only have the rule id you can use pfctl to display the respective rule:

                        pfctl -vvsr | grep <rule-id>
                        
                        R 1 Reply Last reply Reply Quote 0
                        • R
                          robMarchetti @viragomann last edited by

                          @viragomann It looks like the protocols for the blocked outbound LAN traffic are TCP:PA, and TCP:FPA. I've never seen that before, but I'm guessing those might be invalid or fragmented packets?

                          194691ce-b438-47af-a357-080ae18e5dd5-image.png

                          Eric-LTS V 3 Replies Last reply Reply Quote 0
                          • Eric-LTS
                            Eric-LTS @robMarchetti last edited by

                            @robmarchetti https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html

                            This may be what you're looking for

                            1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @robMarchetti last edited by

                              @robmarchetti
                              Yes, all TCP flags other than SYN means that pfSense has no state for it in its state table.
                              Maybe the connection was already closed due to timeout. Maybe you have a sort of an asymmetric routing issue.

                              R 1 Reply Last reply Reply Quote 1
                              • Eric-LTS
                                Eric-LTS @robMarchetti last edited by

                                @robmarchetti

                                Did you make any changes in System > Advanced > Firewall & NAT > State Timeouts?

                                Also, are you otherwise having any actual outbound issues or were you just noticing the logs?

                                R 1 Reply Last reply Reply Quote 0
                                • R
                                  robMarchetti @viragomann last edited by

                                  @viragomann Thanks for your help, after looking at the literature I realize now that what I saw in the logs is actually normal as pfsense drops out of state traffic by default. I had a layer 8 problem!

                                  S 1 Reply Last reply Reply Quote 0
                                  • R
                                    robMarchetti @Eric-LTS last edited by

                                    @eric-lts Nope, the state timeout settings are all set to default. And the network functions perfectly well, I just didn't understand what I saw in the logs. Thanks for the help.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      SteveITS Rebel Alliance @robMarchetti last edited by

                                      @robmarchetti said in unexpected outbound traffic blockage:

                                      pfsense drops out of state traffic by default

                                      We normally uncheck the "Log packets matched from the default block rules in the ruleset" log option, since there can be a lot, and just turn that on if debugging new rules.

                                      Only install packages for your version, or risk breaking it. If yours is older, select it in System/Update/Update Settings.
                                      When upgrading, let it finish. Allow 10-15 minutes, or more depending on packages and device speed.
                                      Upvote 👍 helpful posts!

                                      1 Reply Last reply Reply Quote 1
                                      • First post
                                        Last post