• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

ACL (Access Control List) rule order issue

Scheduled Pinned Locked Moved Firewalling
35 Posts 4 Posters 2.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bingo600 @JonathanLee
    last edited by bingo600 Aug 23, 2023, 7:16 PM Aug 23, 2023, 7:00 PM

    @JonathanLee said in ACL (Access Control List) rule order issue:

    @johnpoz I found the issue, as soon as I removed all the "Seperators" the order stays.

    I have a "Sepetator/Order issue too" , when i do a copy "rule" from on if to another.
    See:
    https://forum.netgate.com/topic/182063/when-copying-a-rule-from-one-if-to-another-it-seems-like-pfsense-is-reordering-the-rules-wrong

    Seems like this one addresses it ... But for 2.8.0 , and made 6 days ago.
    https://redmine.pfsense.org/issues/14691

    My issue was reported to stephenw10 15 days ago

    /Bingo

    If you find my answer useful - Please give the post a 👍 - "thumbs up"

    pfSense+ 23.05.1 (ZFS)

    QOTOM-Q355G4 Quad Lan.
    CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
    LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

    1 Reply Last reply Reply Quote 0
    • M
      marcosm Netgate
      last edited by Aug 23, 2023, 9:35 PM

      @JonathanLee said in ACL (Access Control List) rule order issue:

      I restore the last config change and it goes back. I also noticed one day my separators some were all the sudden missing. Just weird

      This is due to previous bugs (fixed in dev snaps) where the separator could end up with an out of range index. This is fixed with #14619.

      Regarding the rules themselves changing order, I can only replicate that if I change the config while editing a rule. For example, start editing a rule on one browser tab, make rule order changes on another tab, then save the change in the original tab. This is known behavior that is due to the index being "cached" while an entry is being edited. There are other places in the GUI that behave like this, and supporting simultaneous changes to the config warrants a much broader code change. Until then, make sure that rules/aliases/etc are changed one at a time.

      J J 2 Replies Last reply Aug 23, 2023, 9:45 PM Reply Quote 3
      • J
        johnpoz LAYER 8 Global Moderator @marcosm
        last edited by Aug 23, 2023, 9:45 PM

        @marcosm said in ACL (Access Control List) rule order issue:

        make sure that rules/aliases/etc are changed one at a time.

        Great advice!

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • J
          JonathanLee @marcosm
          last edited by Aug 23, 2023, 11:35 PM

          @marcosm thanks for the update and looking into this.

          The only resolve for me was to just remove the separators for this. I am glad to see it has already been resolved in the next release.

          J 1 Reply Last reply Aug 23, 2023, 11:57 PM Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator @JonathanLee
            last edited by johnpoz Aug 23, 2023, 11:57 PM Aug 23, 2023, 11:57 PM

            @JonathanLee on a side note, why are you blocking multicast 224.0.0.0/4 and labeling it known infection source?

            What on pfsense do you think would even be listening on multicast? And it sure wouldn't go any further than the local network.. Blocking it at pfsense doesn't stop it from reaching any other device on that network.. So if you honestly think it is used to spread some infection, blocking it at pfsense isn't doing anything.. Other then stopping pfsense from seeing the traffic, if there was something listening.. Which off the top of my head, I can't think of why pfsense would need or you would want pfsense to see any multicast traffic.. Unless you were doing something with avahi or something.

            So its not really going to hurt anything. But the rule is pretty pointless..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            J 1 Reply Last reply Aug 24, 2023, 12:11 AM Reply Quote 0
            • J
              JonathanLee @johnpoz
              last edited by JonathanLee Aug 24, 2023, 12:22 AM Aug 24, 2023, 12:11 AM

              @johnpoz we talked about this in the past, I do not use any iot devices or Amazon lightbulbs. I have zero multicast devices at my house however traffic was going to that weird I think it was 225.225.225.224 multicast address. Remember, a couple months ago you said you too blocked it at your switch. The notes on it is just wrong it should say multicast, but it's carried over from the wan bogon rule I made, again that is already built into the bogo rules I cloned it from wan into lan. I see it everyonce and a while block multicast traffic but not much.

              Screenshot 2023-08-23 171407.jpg

              There I fixed the description now that my rules stay in order 🤣. I agree that should not say that on the LAN side only on wan side.

              J 1 Reply Last reply Aug 24, 2023, 1:39 AM Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator @JonathanLee
                last edited by johnpoz Aug 24, 2023, 1:58 AM Aug 24, 2023, 1:39 AM

                @JonathanLee said in ACL (Access Control List) rule order issue:

                Remember, a couple months ago you said you too blocked it at your switch

                I do block it at the switch, but a switch is not pfsense. Blocking it at pfsense doesn't stop it from going to every device on the network. Its multicast.. It goes everywhere on that L2 network.. I block it at the switch because its NOISE, if your not using it.. I am not using it - so its noise.. If you do not want the noise, then you should stop it at the source, or on the switch.

                Even if you block it at every device on the network - unless you stop the device that is sending it, its still noise on the wire.. I block it at the switch, so some device sending it.. I believe in my example it was stupid plex.. I couldn't turn it off at plex so I stop it at the switch port plex is connected too - so it can't go to every other device on the network. Its not a "infection" source its noise.

                Again - like I said its not hurting anything, its just pretty pointless. Do you understand how multicast and broadcast traffic works? Blocking it at the router doesn't do anything about the noise, it just stops the router from seeing something it wouldn't do anything with anyway.

                All the other devices on that network still going to see it, while in the big picture a few extra packets on the wire isn't a bit thing, but you multiple it by 10 devices or 100 devices all spewing noise it can amount to well a lot of noise ;)

                Think of it this way, if you leave the TV on at a level that everyone in the house can hear. if you put in some earplugs you might not hear it, but everyone else in the house can still hear it. Blocking it at pfsense amounts pfsense just putting in some ear plugs that block multicast traffic - all the other devices on your network still going to see it ;)

                When I block it at the switch, while I might not turn the tv off - I close the door to that room, now nobody else in the house can hear the tv noise.. Does that make sense?

                This is what I block at the switch

                block.jpg

                The specific noise I do want going everywhere on the network.. That 239.255.255.250 is the specific plex ssdp. That 224.0.144.1 is something specific that off the top of my head I do not recall why I was blocking it, have to look to see what is sending it again. That broadcast 255.255.255.255 on port 6667 is noise my wifi lightbulbs send out.. There is no reason for it to leave the port the AP is connected to and go to every other device on my other AP, or my other devices that might happen to be on that same L2 network, which is used by all my iot devices..

                edit: here this is a 12 second dump on my 1 AP, see the noise..

                dump.jpg

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                J 1 Reply Last reply Aug 24, 2023, 2:04 AM Reply Quote 1
                • J
                  JonathanLee @johnpoz
                  last edited by JonathanLee Aug 24, 2023, 2:05 AM Aug 24, 2023, 2:04 AM

                  @johnpoz what about when running a pcie mini card for wifi inside of the pfSense? I was think I originally wondering why it was establishing a connection to it so I just blocked it to stop it. It stopped the connections so I moved on. That was a post some time ago you worked on with me.

                  1 Reply Last reply Reply Quote 0
                  • J
                    JonathanLee
                    last edited by JonathanLee Dec 16, 2023, 6:59 AM Dec 16, 2023, 6:26 AM

                    I just noticed that the separators all saved for some reason in the config.xml file but they are not showing up

                    This is on 23.05.01 and they appear all the sudden on 23.09.01 again

                    Screenshot 2023-12-15 at 10.19.31 PM.png

                    I deleted them ages ago they still cause issues. The separators are not even showing up I deleted them ages ago, ghost separators

                    1 Reply Last reply Reply Quote 0
                    • J
                      JonathanLee
                      last edited by JonathanLee Dec 16, 2023, 6:58 AM Dec 16, 2023, 6:38 AM

                      can I just remove this section of my config.xml?

                      <separator>
                      			<wan></wan>
                      			<lan></lan>
                      			<opt1>
                      				<sep0>
                      					<row>fr5</row>
                      					<text><![CDATA[HTTP REDIRECT NAT]]></text>
                      					<color>bg-danger</color>
                      					<if>opt1</if>
                      				</sep0>
                      				<sep1>
                      					<row>fr7</row>
                      					<text><![CDATA[GUI/PROXY/STANDARD RULES DNS NTP HTTPS HTTP]]></text>
                      					<color>bg-success</color>
                      					<if>opt1</if>
                      				</sep1>
                      				<sep2>
                      					<row>fr9</row>
                      					<text><![CDATA[*******NAT DNS NTP*******]]></text>
                      					<color>bg-info</color>
                      					<if>opt1</if>
                      				</sep2>
                      				<sep3>
                      					<row>fr14</row>
                      					<text><![CDATA[XBOX RULES]]></text>
                      					<color>bg-success</color>
                      					<if>opt1</if>
                      				</sep3>
                      				<sep4>
                      					<row>fr16</row>
                      					<text><![CDATA[Apple/Android Rules]]></text>
                      					<color>bg-success</color>
                      					<if>opt1</if>
                      				</sep4>
                      				<sep5>
                      					<row>fr19</row>
                      					<text><![CDATA[MAIL RULES]]></text>
                      					<color>bg-info</color>
                      					<if>opt1</if>
                      				</sep5>
                      				<sep6>
                      					<row>fr21</row>
                      					<text><![CDATA[Ping/Arp]]></text>
                      					<color>bg-info</color>
                      					<if>opt1</if>
                      				</sep6>
                      				<sep7>
                      					<row>fr23</row>
                      					<text><![CDATA[DEFAULT BLOCK/DISABLE RULES]]></text>
                      					<color>bg-warning</color>
                      					<if>opt1</if>
                      				</sep7>
                      			</opt1>
                      			<floatingrules></floatingrules>
                      			<ethernetrules></ethernetrules>
                      		</separator>
                      

                      It is not showing up and only does when I install 23.09.01

                      1 Reply Last reply Reply Quote 0
                      • J
                        JonathanLee
                        last edited by Dec 16, 2023, 6:57 AM

                        This post is deleted!
                        1 Reply Last reply Reply Quote 0
                        • J
                          JonathanLee
                          last edited by Dec 16, 2023, 6:57 AM

                          It should be this

                                           <separator>
                          			<wan></wan>
                          			<lan></lan>
                          			<opt1></opt1>
                          			<floatingrules></floatingrules>
                          			<ethernetrules></ethernetrules>
                          		</separator>
                          

                          I deleted them years ago in the GUI and they were never used with opt1

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received