Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to allow syslog-ng from DMZ to LAN?

    Scheduled Pinned Locked Moved Firewalling
    11 Posts 2 Posters 482 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      selroc
      last edited by

      Hello, I have attempted in different ways but still the syslog-ng traffic is not passing from the DMZ server to the LAN monitoring station.

      Please help much appreciated.

      DMZ: 192.168.2.0/24
      LAN: 10.10.0.0/16

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @selroc
        last edited by johnpoz

        @selroc syslog is normally udp 514, so create a rule on your dmz interface that allows talking to whatever IP your monitoring station is on your lan. Unless your using some other port? Or tcp? Just make the appropriate rule.

        Rules are evaluated top down, first rule to trigger wins, no other rules are evaluated - so your rule needs be above where you would block or policy route traffic.

        Post up a picture of your dmz rules. Do you have any rules in your floating tab, they are evaluated before interface rules.

        Also keeping in mind that the syslog sender in your dmz needs to be using pfsense dmz IP as its gateway, and any firewall rules the host wanting to accept the syslog needs to allow for it.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • S
          selroc
          last edited by

          Thank you, here a screenshot of DMZ firewall rules:

          79579f6a-b05a-4557-a27e-9bfe20c9f494-image.png

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @selroc
            last edited by johnpoz

            @selroc well your source is going to be some random port, not 514 so that is why that rule is never triggering.

            also its pretty pointless to block bogon on your local side.. How would any IP be source of ingress into that interface? And your rules that allow traffic state it has to be a opt1 subnet for the source anyway. So any other IP as source would never be allowed in the first place.

            And your rule below that forces all traffic out your gateway there, your syslog traffic would be allowed by that rule but your forcing it out a gateway that can't get to your syslog server.

            Your rule blocking to your lan should really be above your any rule that allows anything, but forces it out your fiber gateway.. There is little reason to policy route unless you have more than one gateway and want traffic to use a specific one. Do you have more than 1 gateway to get to the internet, a vpn connection? etc..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • S
              selroc
              last edited by

              Does it look better now?

              c88b6025-3436-4a05-a6b5-329e9a6c4511-image.png

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @selroc
                last edited by johnpoz

                @selroc that syslog rule should work now.. If that is the IP your sending to and your sending udp 514 and not tcp or some other port. But I see no triggers on it as of yet see the 0/0 B that means no traffic has even triggered that rule.

                Have you sent syslog traffic? Do you have any rules in floating that might supersede your syslog allow rule?

                I would move your block to lan above your policy route rule. Depending on your settings if that gateway goes down, that rule could just be there without the policy route, which would allow access from anything on your opt1 to talk to anything on any of your other networks.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • S
                  selroc
                  last edited by

                  Yes there is one rule to block inbound ssh:

                  9fddec6c-4ad9-44e6-975c-ee657af36802-image.png

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @selroc
                    last edited by

                    @selroc well that would have nothing to do with it.. So are you sending syslog and are you seeing numbers change on the states from 0/0 if not then your not sending to port 514 udp, or not to that IP or that device is not using pfsense as its gateway.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • S
                      selroc
                      last edited by

                      Yes there is traffic now:

                      80cd31f7-e775-4dce-837c-089f7222424a-image.png

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @selroc
                        last edited by

                        @selroc great, so your working then.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • S
                          selroc
                          last edited by

                          Thank you very much for your prompt help.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.