Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How do I match tagged traffic?

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 4 Posters 548 Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • senseivitaS Offline
      senseivita
      last edited by

      How does the floating rule matches the traffic out?

      The inbound rules is straightforward to understand but on the rule out, i.e. floating, an interface as well as a gateway can be chosen. Which is it? Is traffic direction needed too or the tag is enough as identifier of the source?

      I tried this:

      64a92b27-05d8-4f2c-bf93-0ab1dd23a590-image.png

      It got me offline, probably locked out too if the safeguard rule wasn't before it.

      BTW, I pasted from a spreadsheet from LibreOffice Calc in Fedora so to code-space it into a table but the little image with it formatted and all came up immediately, is that a feature of the forum webapp or from the spreasheets app? :O It's really handy. <3 The text was still left behind but really broken.

      Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

      JKnottJ S 2 Replies Last reply Reply Quote 0
      • JKnottJ Offline
        JKnott @senseivita
        last edited by

        @skilledinept

        When you use tagged VLANs, all devices have to use the same VLAN ID. For example, I have my guest WiFi on VLAN 3. So, I configured VLAN 3 on pfsense, my Cisco switch and Unifi AP for the guest SSID.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        senseivitaS 1 Reply Last reply Reply Quote 0
        • senseivitaS Offline
          senseivita @JKnott
          last edited by

          @JKnott Hey thanks,

          But what I mean was marking, I didn't want to use tagging because it's ambiguous but that's how it's called in the UI--it's odd bc in the docs they use they use marking/matching. Thanks anyway.

          If you know how how to policy filter, I believe that's what's called, I'd appreciate the help though. This is the one feature I've never been able to figure out. :/

          Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator @senseivita
            last edited by

            @skilledinept said in How do I match tagged traffic?:

            If you know how how to policy filter

            On what exactly? If you don't want a device on network going out, then block it - you don't need to tag it and then use a floating rule?

            What exactly are you wanting to accomplish?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07 | Lab VMs 2.8, 25.07

            senseivitaS 1 Reply Last reply Reply Quote 0
            • senseivitaS Offline
              senseivita @johnpoz
              last edited by

              @johnpoz I'm not looking to actually filter but rather policy route but with tags.

              I want to learn this so I can create more complex rulesets and to modify routes without having to go through every internal interface -- rarely they're fewer than the external ones -- create rules that wouldn't otherwise work because of the lack of reply-to and see what else can be done. :)

              I have to learn how to create a simple rule pair first, on which I keep failing miserably before I get distracted or something.

              Could you tell me how is the floating rule set up, please? The gateway isn't chosen in the gateway section like on LAN rules, is it?

              Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ Offline
                johnpoz LAYER 8 Global Moderator @senseivita
                last edited by

                @skilledinept off the top not sure how the gateway selection in an outbound rule would come into play. With outbound rules the nat has already happened. So match could be used to block or allow traffic out a specific interface.

                Do you have multiple gateways using the same source IP??

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                senseivitaS 1 Reply Last reply Reply Quote 0
                • senseivitaS Offline
                  senseivita @johnpoz
                  last edited by

                  @johnpoz said in How do I match tagged traffic?:

                  off the top not sure how the gateway selection in an outbound rule would come into play.

                  [I meant to answer sooner but it took a while to retest and stitch screenshots, sorry]

                  Yes, I figured as much--well, except for the NAT part. What I know, very loosely is that the WAN interfaces (or other interface) that pass the tagged traffic become the only ones that are allowed to do so. Which would mean that tagging traffic in the LAN interfaces is actually consequential and cannot (the tag) just be discarded so the rule is evaluated using the without it. Since the WAN interface itself is the counterpart for the mark, it assumes the role of the gateway — and validates my unverified notion that the matching tags act like floodgates, where there's one traffic is allowed to go out like a more carefree multi-WAN — therefore there's no need for gateway.

                  I learned most of this from a presentation playing in the background several years ago. It was before I even knew what pfSense was. I can't find the video anymore, it was about VoIP in some Mikrotik seminar (ouch).

                  This is the real ruleset:
                  policy-filtering.png

                  I'm not load balancing if that's what you mean for several gateways for a source. I do have several gateways, tunnels, I'm not load balancing though. Some traffic (DNS for DCs) is tiered+load-balanced but it doesn't apply to the test group. Before answering, I downsized the scope to a single host and bypassed all the rules (screenshots above) double-checked it matches the example from earlier.

                  Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

                  1 Reply Last reply Reply Quote 0
                  • senseivitaS Offline
                    senseivita
                    last edited by

                    In the screenshots the tag doesn't match. It just an accidental keystroke while taking the screenshots, it wasn't saved. Both rules have the same tag: udef_v.

                    Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

                    1 Reply Last reply Reply Quote 0
                    • S Offline
                      SteveITS Rebel Alliance @senseivita
                      last edited by

                      @skilledinept said in How do I match tagged traffic?:

                      How does the floating rule matches the traffic out?

                      Did you find this doc section? The paragraph above that discusses direction. Going out WAN the packets have all been NATted so you can't ID by LAN IP.

                      For instance a floating rule on LAN to tag VoIP traffic from certain IPs, and another floating rule on WAN to put that tagged packet in the qVoIP queue to prioritize it.

                      Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                      Upvote 👍 helpful posts!

                      senseivitaS 1 Reply Last reply Reply Quote 0
                      • senseivitaS Offline
                        senseivita @SteveITS
                        last edited by

                        @steveits said in How do I match tagged traffic?:

                        Going out WAN the packets have all been NATted so you can't ID by LAN IP.

                        Yep, but that's taken care by the tag isn't it?: "This is a useful way to act on WAN outbound traffic from one specific internal host that could not otherwise be matched due to NAT masking…".

                        Then it goes "on a LAN rule, (…) Then on a floating rule, quick, outbound on WAN, use Tagged with the same string to act on the traffic matched by the LAN rule." I thought that was what I had. Apparently I don't.

                        Thanks for answering, BTW.

                        Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

                        senseivitaS 1 Reply Last reply Reply Quote 0
                        • senseivitaS Offline
                          senseivita @senseivita
                          last edited by

                          I disabled the floating rule and echo reqs started flowing in my test host. The marking the traffic on itself doesn't make a condition to evaluate. Having a rule that matches the mark, however, does. And, it "steals" the traffic with the mark but it doesn't steer it:

                          I removed interface selection from the floating rule, saved, applied, cleared states et voilà, on y va.
                          Screen Shot 2021-09-04 at 13.54.50.png

                          Added a gateway on the floating rule just to rule it out, heh, saved, applied, cleared. Dead.

                          Then I started experimenting:

                          • I selected the desired gateway interface in the floating rule, traffic kept flowing except it was NATted from the default gateway.
                          • I tried changing the direction every which way(in,out,both), nope.
                          • I tried adding the desired gateway interface in addition to the interface where the traffic is sourced from, no. (floating rule if: lan_z0009,wan_z2522usdetroit)
                          • I tried the default gateway (wan_gpon) from where traffic would otherwise exit. nope.
                          • After each modification of interface I also modified the direction for each. Save-Apply-Clear-Repeat.

                          Then I reread the docs really slow out loud, 'cause that's how devices work, everybody knows that.

                          Marking and Matching
                          (...)
                          It can also be used similarly for applying shaping outbound on WAN from traffic specifically tagged on the way into the firewall.

                          It stood out: specifically tagged on the way in… and shaping. What's used for queues and shaping? Match.

                          Match Action

                          The match blablah… for purposes of assigning traffic to queues or limiters for traffic shaping. Match rules do not work with Quick enabled.

                          I was making conspiracy theories now but it's worth the shot: I changed the action from pass to match. Retried everything plus an extra step for quick and non-quick. Save-Apply-Clear-Repeat. Traffic actually kept flowing but NAT wasn't changed. Somehow I managed to change the direction of the echo requests though. :)

                          Screen Shot 2021-09-04 at 14.20.52.png

                          Screen Shot 2021-09-04 at 14.21.00.png

                          It sort of worked except for NAT, which was the biggest appeal, at least of the way I thought things worked. It was distressingly fun. Thanks for your help!

                          Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

                          S 1 Reply Last reply Reply Quote 0
                          • S Offline
                            SteveITS Rebel Alliance @senseivita
                            last edited by

                            @skilledinept said in How do I match tagged traffic?:

                            Then I reread the docs really slow out loud

                            LOL. That has helped me in life too. Glad you got it sorted. I also have found it helpful to look at states when matching traffic because things like a web server response (download) are via an incoming state (HTTP get).

                            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                            Upvote 👍 helpful posts!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.