Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How can I create an explicit rule for related traffic?

    Scheduled Pinned Locked Moved Firewalling
    2 Posts 2 Posters 241 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • senseivitaS Offline
      senseivita
      last edited by

      I have a WAN interface block rule that affecting related states/return traffic of another rule LAN interface pass rule.

      So, I want to create a rule to accept related states like it does for the rest of the rules. I think I need to access what pfSense abstracts; pf. Am I right? Can it be done??

      Alternatively, I know rule tagging/marking doesn't leave the firewall, but is it able to recognize return traffic to match it?

      I also have static outbound NAT, and the block rule is a geographic rule, so I'm kind of thinking it's possible that since the matching potential is so large, I've exhausted the states allowed per rule/host/something thus it's blocking legitimate traffic. Ballpark?

      I just realized by related I should've said established traffic. Sorry about that. :/

      Missing something? Word endings, maybe? I included a free puzzle in this msg if you solv--okay, I'm lying. It's dyslexia, makes me do that, sorry! Just finish the word; they're rarely misspelled, just incomplete. Yeah-yeah-I know. Same thing.

      1 Reply Last reply Reply Quote 0
      • T Offline
        Tzvia
        last edited by

        Well, as unsolicited traffic on WAN is blocked by default, I am assuming you are trying to block return traffic that matches something- IPs in geographic regions? As it's return traffic that you are trying to block, isn't it better to block it on the LAN side, traffic going out TO somewhere you don't want, as opposed to letting the user reach that IP, and then have that return traffic blocked. Maybe I am not sure of what you are trying to do, you allow the traffic OUT then stop it on the way back...

        Tzvia

        Current build:
        Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
        16 gigs ram
        500gig WD Blue nvme
        Using modded BIOS (enabled CSTATES)
        PFSense 2.72-RELEASE
        Enabled Intel SpeedShift
        Snort
        PFBlockerNG
        LAN and 5 VLANS

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.