how to stop logging blocked LAN IGMP?
-
@johnpoz said in how to stop logging blocked LAN IGMP?:
what are you doing specifically on pfsense with it? Sure you can do all kinds of stuff with at your switches - what does pfsense do with it?
What is pfsense going to do with traffic to 224.0.0.2?
Wait one...
-
The patch for IP options requires a binary change to filterlog, i.e. for it to work you need to update to 25.11.
-
Thanks. I’ll apply the update when it’s released into production.
-
@dennypage said in how to stop logging blocked LAN IGMP?:
Wait one...
Wait 1 week, 1 month, 1 year? hehehe ;) Its been over a week, so month? hahahah
-
@johnpoz said in how to stop logging blocked LAN IGMP?:
@dennypage said in how to stop logging blocked LAN IGMP?:
Wait one...
Wait 1 week, 1 month, 1 year? hehehe ;) Its been over a week, so month? hahahah
It was only a few days, but I forgot. Been real busy.

Multicast Bridge had been published, and I am working on the package to go with it.
-
@dennypage not really what I asked to be honest - out of the box what would pfsense do with traffic to 224.0.0.2 that someone would want to happen? bridging your multicast between networks that pfsense is connected to was not my question.
What use currently would some user have with allowing 224.0.0.2 to pfsense - for pfsense to process?
-
@johnpoz said in how to stop logging blocked LAN IGMP?:
not really what I asked to be honest - out of the box what would pfsense do with traffic to 224.0.0.2 that someone would want to happen? bridging your multicast between networks that pfsense is connected to was not my question.
Sigh. Out of the box, pfSense doesn't do a lot of things, so narrowing the question to 224.0.0.2 isn't meaningful. The high level question was about the value of IGMP.
I know that you hate multicast, and it's okay that you do. But that doesn't mean everyone else has to hate it as well. There are a lot of things in the world that depend upon multicast, including routing protocols, which means IGMP and MLD are important protocols in the network.
-
@dennypage not a fan no - but not really the point.. So pfsense doesn't do anything with it out of the box.. So your statement that you should allow vs block was my point. If there is nothing pfsense is going to do with it, and it cluttering up your logs anyway.. Why would you not just block it an be done.. And just prevent it from going any further up that stack that nothing is going to happen with anyway.
Again going to stress that multicast for sure has lots of benefit and uses - if your using it.. But more likely than not typical home user or smb is going to have little use for it.
-
Rewinding back a year to the start of this post: on my home network (single class C, no vlans) I don't care whether IGMP is passed, blocked or just plain ignored - but I don't want my logs cluttered. Until this promising new patch I was unable to silence those log entries via rules or UI changes, and ended up ditching perfectly good wifi access points just because they were IGMP chatbots even in AP mode.
-
@johnpoz said in how to stop logging blocked LAN IGMP?:
If there is nothing pfsense is going to do with it, and it cluttering up your logs anyway.. Why would you not just block it an be done.. And just prevent it from going any further up that stack that nothing is going to happen with anyway.
A good deal of home gear supports IGMP snooping these days, and some have it enabled by default now. Almost all smb gear support snooping.
As noted previously, if snooping is enabled and you block IGMP, some important things are not going to work correctly. mDNS is a shining example. VRRP and CARP are also good examples. It's true that a lot of home users don't run redundant setups needing VRRP or CARP, but smb certainly does.
Again going to stress that multicast for sure has lots of benefit and uses - if your using it.. But more likely than not typical home user or smb is going to have little use for it.
No, almost every home or smb user depends heavily on upon multicast, whether they know it or not. mDNS has become a critical network service for just about everything related to discovery or interoperability on the local network. Printing, file sharing, audio, home automation, etc. -- they all depend upon multicast.
There's a lot of desire out there to segregate various systems in to trusted and untrusted network segments, usually for good reason. When you segment like this, you also need to be able to route multicast between the segments or things break. This is where things like mdns-bridge and mcast-bridge become necessary.