Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Floating Rules order

    Scheduled Pinned Locked Moved General pfSense Questions
    19 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      Shan lapierre
      last edited by

      Hi, i'am trying to understand why Floating rules are not working.
      From what i've understood they comes first of pfBlockerNG's rules.
      But is not working.
      Can someone explain me how to solve it?
      Settings under pfBlockerNG "Firewall 'Auto' Rule Order" is : | pfSense Pass/Match | pfB_Pass/Match | pfB_Block/Reject | pfSense Block/Reject |

      Regards

      S 1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        What do the created floating rules actually look like?

        How are you testing them?

        Steve

        1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @Shan lapierre
          last edited by

          @Shan-lapierre For any pfB rules I don’t want first, I create them as Alias Native which just creates the alias. Then I create rules where desired.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          S 1 Reply Last reply Reply Quote 0
          • S
            Shan lapierre @SteveITS
            last edited by

            Thanks guys for replies.
            I almost found a solution but something still not working.
            let me explain.
            I've changed any pfB rules in Alias Type and then deleted auto rules created by pfB and then i crated newone based on alias.
            Then created a floating rules (ones that they comes before pfB). Applied and reloded everything.
            I've also created a NAT rules (see pictures) and very strange thing is that the second rule (nat) concerning port range 6000-6399 doesnt work at all. The one regarding port 5060 it working.
            I cannot understand why

            cb04b298-ffd6-4378-a2a6-fa5150b70be1-image.png

            087cfe44-8a26-4247-a7e6-7b829671c9c4-image.png

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Is that RTP traffic actually arriving at the WAN? Try running a packet capture to confirm.

              S 1 Reply Last reply Reply Quote 0
              • S
                Shan lapierre @stephenw10
                last edited by

                @stephenw10 Yes, is RTp traffic.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Yes but is it arriving at the WAN from the remote server?

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    Shan lapierre @stephenw10
                    last edited by

                    @stephenw10 Sure! And also i can see dropped packets from firewall 's logs regarding destination ports 6xxx.
                    So RTP flow arrives to WAN interface and if I click on red x (on firewall logs dropped entry) I see that is dropped by pfB rule.
                    Maybe have I to restart firewall?

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      If it's blocked there then it isn't matching the floating pass rule. What do the blocks show?

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        Shan lapierre @stephenw10
                        last edited by

                        @stephenw10 ,Here what's say blocked rule:

                        fbf98406-ebea-4367-b9ef-5e8976ac8197-image.png

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          That looks like it's hitting the WAN address? Unless the VoIP device has a public IP (routed) I expect a NAT rule to be forwarding that to some internal address.

                          What is in the Audiocodes_MP112 alias?

                          S 1 Reply Last reply Reply Quote 0
                          • S
                            Shan lapierre @stephenw10
                            last edited by

                            @stephenw10 exactly. AudiocodesMP alias is 192.168.1.20. So what's wrong in my configuration?

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Whatever port forward you have is not catching the incoming RTP traffic.

                              But the forward you have for SIP is.

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                Shan lapierre @stephenw10
                                last edited by

                                @stephenw10 Ok ..that is clear 😃. I cannot understand why SIP port is matching and RTP not. Rules are done in same way . Is there some specific log to understand better ? And is there such a way to see a matched rule in some logs?

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Show us your NAT rules for that traffic.

                                  S 1 Reply Last reply Reply Quote 0
                                  • S
                                    Shan lapierre @stephenw10
                                    last edited by

                                    @stephenw10 8fa3e9fb-ab47-4520-9101-31bde2e2395b-image.png
                                    IP_Audiocodes_ACS = src public IP
                                    Audiocodes_MP112 = internal device where RTP flow should be redirected

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Hmm, I'd expect that to match assuming the source and destination addresses match what's redacted above.

                                      Especially since the SIP forward appears to work. I'd check the states though and make sure it actually is.

                                      S 1 Reply Last reply Reply Quote 0
                                      • S
                                        Shan lapierre @stephenw10
                                        last edited by

                                        @stephenw10 Sorry but "it actually is" what?

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Make sure the NAT rule for SIP is actually working. The states will show the translation.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.