Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Which rule is this? Default deny rule IPv4 (1000000103)

    Scheduled Pinned Locked Moved Firewalling
    8 Posts 4 Posters 975 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      Crak
      last edited by

      This post is deleted!
      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @Crak
        last edited by

        @crak said in Which rule is this? Default deny rule IPv4 (1000000103):

        the traffic is getting blocked using Default deny rule IPv4 (1000000103).

        If you had rules to allow traffic that was matching - then that rule would not be triggered.. So if you have placed a rule to allow traffic, but its being blocked by the default deny then your allow rule is not triggering for some reason.

        Could you post up your rules so we could see..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        J 1 Reply Last reply Reply Quote 0
        • J
          jacobrale @johnpoz
          last edited by jacobrale

          @johnpoz @crak -

          I know this topic is old, but I get exactly the same message. I'm try to solve an intermittent DNS issue, (I think) and the troubleshooting step suggesting looking for blocked connections and examining the associated rules.

          I get this as the deny:

          Nov 11 04:02:07 	LAN 	Default deny rule IPv4 (1000000103) 	192.168.1.71:53998		216.239.32.223:443		TCP:PA
          Nov 11 04:02:07 	LAN 	Default deny rule IPv4 (1000000103) 	192.168.1.71:53998		216.239.32.223:443		TCP:RA
          Nov 11 04:22:29 	LAN 	Default deny rule IPv4 (1000000103) 	192.168.1.71:47738		142.250.81.234:443		TCP:RA
          Nov 11 04:22:29 	LAN 	Default deny rule IPv4 (1000000103) 	192.168.1.71:40272		216.239.36.223:443		TCP:RA 
          

          continues, and from a small number of other IPs in my internal network. Why would it deny these? I don't see them in the rules at all (see below):
          .....
          WAN Rules:
          WAN_Rules.png
          .......
          LAN Rules:
          LAN_Rules.png

          ......
          Floating Rules:
          Floating_Rules.png

          .....
          OpenVPN Rules:
          OpenVPN.png

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @jacobrale
            last edited by

            @jacobrale said in Which rule is this? Default deny rule IPv4 (1000000103):

            Why would it deny these?

            Those are out of state, the PA is a psh,ack and the RAs are reset,ack - ie close this session.

            If you see SYN (S) that is the firewall saying hey I have no rules to allow this, when you see other like A, or PA, FA or RA, etc.. those are firewall saying hey I don't have a state to allow this. Ie out of state block.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            J 1 Reply Last reply Reply Quote 0
            • J
              jacobrale @johnpoz
              last edited by jacobrale

              @johnpoz THANKS!

              What does "out of state" mean? And how can you tell?) How does that relate to them being deny on the way out of my network?

              johnpozJ S 2 Replies Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @jacobrale
                last edited by johnpoz

                @jacobrale like I said SYN is what opens a state, if there is no state and no firewall rules to allow it then it would blocked. If you allow it and your seeing those points to the state was closed, and the client if wants to talk would have to reopen with a syn. They can closed because the session timed out and the client is trying to reuse an old session, or the state was closed either on purpose on the firewall with a kill state, or maybe set to reset states on loss of gateway, or possible the firewall already saw the fin and fin,acks to close the state already and these are late packets or retrans, etc.

                Could be the client sent a fin, and firewall closed the state so the client didn't see the fin,ack so it sent a RST..

                If you see a block that is anything but SYN then its a given there is no state in the firewall. It's not uncommon to see these now and then for a bunch of varied reasons.. The ones to worry about more would be SA (syn,ack) this points to something wrong with asymmetrical routing quite often.

                Not sure why 443 would be dns related? Do you have clients using doh? Those IPs seem to be google owned, but not sure why a client would be sending doh to those specific IPs? The IPs you should see if you were sending doh queries to google would be IPv4: 8.8.8.8 and 8.8.4.4..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • S
                  SteveITS Galactic Empire @jacobrale
                  last edited by

                  @jacobrale See if this helps:

                  https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html#out-of-state-web-server-packets

                  IOW it may be nothing.

                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                  Upvote 👍 helpful posts!

                  johnpozJ 1 Reply Last reply Reply Quote 1
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @SteveITS
                    last edited by johnpoz

                    @SteveITS exactly.. Notice the RAs to those 3 IPs.. Its possible their was fin that closed the state but the client didn't get them for whatever reason, so it sent an RA (reset)..

                    @jacobrale I wouldn't worry about them too much to be honest.. Unless your log is just being flooded with them, then you might have something going on that you should look into. Those don't have anything to do with some dns related problem your having - again if your client was doing doh to google dns, it wouldn't be going to those IPs - so those for sure are not related to any sort of dns problem you might be having.

                    I personally don't even log default deny.. I log specific rules. And for noise coming into my wan, I only log syn blocks and common udp ports.. The rest of the noise I just have no desire to fill my logs with.

                    If something wasn't working and thought it might be helpful to see the default deny logs, can always click and they are now logged. But day to day its not really of interest to me to see a bunch of noise filling up my logs be it local side interfaces or the wan.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.