Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bug Pfblocker new NG 4100

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    pfblockerngnetgatebug
    13 Posts 3 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      neoos
      last edited by

      Bug in new NG-4100

      I discovered a Bug in the nEW NG 4100, , explain.

      In Pfblocker when add a GEOIP in the summary. click in pencil in any continent,

      In Advanced inbound firewall Rule settings in custom Destination, no possible add any alias.
      alt text
      In custom DST Porti s ok, but in Custom Destination no passible add , and With the consequence, that the rule cannot be added.

      I test in the NG-6100 and is ok!!

      Please considreing solved this

      S 1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        It's very unlikely that is a 4100 specific issue. The code there is identical to the 6100.
        I assume both devices are running pfSense 22.01?
        And the same pfBlocker package version? Which one?

        Steve

        1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @neoos
          last edited by

          @neoos said in Bug Pfblocker new NG 4100:

          no possible add any alias

          Did you have pfBlocker run an Update? Until that is done new aliases are not generated, so not available for use.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          N 1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Hmm, that would be true for using pfBlocker aliases inside the pfBlocker config. I'm not sure that's valid though. Making my head hurt thinking about how that would update.... 😵

            S 1 Reply Last reply Reply Quote 0
            • N
              neoos
              last edited by

              Yes updated package, and i test in two diferents units of 4100 i check is the same version in 6100

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Which pfBlocker package though exactly? I'll try to replicate it.

                And this is in 22.01?

                1 Reply Last reply Reply Quote 0
                • S
                  SteveITS Galactic Empire @stephenw10
                  last edited by SteveITS

                  @stephenw10 said in Bug Pfblocker new NG 4100:

                  that would be true for using pfBlocker aliases inside the pfBlocker config

                  :) Maybe I'm not on the same page, but if I create a new IPv4 or IPv6 feed as Alias Native it isn't usable until I run an Update in pfBlocker.

                  @neoos So you are on the GeoIP page and edit a continent there? Did you change Action to Alias Native [edit: or something besides Disabled]? Like so:
                  9f18aaff-208b-4ff8-9236-0eb0851ac0ca-image.png

                  Is this pfBlockerNG-devel or pfBlockerNG? We could not get MaxMind to work with pfBlockerNG so have been using pfBlockerNG-devel for a couple years.

                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                  Upvote 👍 helpful posts!

                  1 Reply Last reply Reply Quote 0
                  • N
                    neoos @SteveITS
                    last edited by

                    @steveits What is the correct use?

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      SteveITS Galactic Empire @neoos
                      last edited by

                      @neoos Alias Native just creates an alias that you can use in any NAT or firewall rule. The other options, like Deny Outbound, create a rule do what they say and by default put those rules at the top of the list of rules.

                      Using Deny can also have some unexpected results if deduplication is enabled, so I always just use Alias Native and create my own rules.

                      From the pfBlocker IPv4 rule page, under Action:

                      'Disabled' Rules: Disables selection and does nothing to selected Alias.

                      'Deny' Rules:
                      'Deny' rules create high priority 'block' or 'reject' rules on the stated interfaces. They don't change the 'pass' rules on other interfaces. Typical uses of 'Deny' rules are:

                      • Deny Both - blocks all traffic in both directions, if the source or destination IP is in the block list
                      • Deny Inbound/Deny Outbound - blocks all traffic in one direction unless it is part of a session started by traffic sent in the other direction. Does not affect traffic in the other direction.
                      • One way 'Deny' rules can be used to selectively block unsolicited incoming (new session) packets in one direction, while still allowing deliberate outgoing sessions to be created in the other direction.

                      'Permit' Rules:
                      'Permit' rules create high priority 'pass' rules on the stated interfaces. They are the opposite of Deny rules, and don't create any 'blocking' effect anywhere. They have priority over all Deny rules. Typical uses of 'Permit' rules are:

                      • To ensure that traffic to/from the listed IPs will always be allowed in the stated directions. They override almost all other Firewall rules on the stated interfaces.
                      • To act as a whitelist for Deny rule exceptions, for example if a large IP range or pre-created blocklist blocks a few IPs that should be accessible.

                      'Match' Rules:
                      'Match' or 'Log' only the traffic on the stated interfaces. This does not Block or Reject. It just Logs the traffic.

                      Match Both - Matches all traffic in both directions, if the source or destination IP is in the list.
                      Match Inbound/Match Outbound - Matches all traffic in one direction only.

                      'Alias' Rules:
                      'Alias' rules create an alias for the list (and do nothing else). This enables a pfBlockerNG list to be used by name, in any firewall rule or pfSense function, as desired.

                      • Options - Alias Deny, Alias Permit, Alias Match, Alias Native
                      • 'Alias Deny' can use De-Duplication and Reputation Processes if configured.
                      • 'Alias Permit' and 'Alias Match' will be saved in the Same folder as the other Permit/Match Auto-Rules
                      • 'Alias Native' lists are kept in their Native format without any modifications.

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote 👍 helpful posts!

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        That's not what the screenshot it from though. It's for using existing aliases in the pfBlocker config to customise the auto added firewall rules. And there does appear to be an Issue there. Just narrowing it down.
                        When typing 't' here I expect to see the IP alias 'Test' I created:

                        Screenshot from 2022-04-21 20-29-36.png

                        S 1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Yeah OK it appears to exist in both current pfBlocker package versions but also on all hardware I tested on.

                          Can we see a screenshot of this working on a 6100?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Nope actually this works as expected on the 4100 (and everything else) it just only accepts Network type aliases there not Host.

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • S
                              SteveITS Galactic Empire @stephenw10
                              last edited by

                              Ah, sorry if I misunderstood.

                              re: network alias, that can be one IP by using a /32 mask.

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              1 Reply Last reply Reply Quote 1
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.