Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Default Deny Rules

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 4 Posters 189 Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W Offline
      wifi-will
      last edited by

      Hi All.

      We are integrating with a Phillips casting server that needs a static route between the guest network and the tv network.

      Due to the pfsense being aware of the route in the routing table, i canot to standard static routes. As such, I have created the route using gateways, and firewal rules.

      We are getting casting registration ok, and the tv side casting server is seeing the traffic.

      The problem is the reply back to the guest is being blocked.

      For some reason, even though I have an allow rule, the pfsense is over riding it and auto creating a deny rule. See attached.

      Can someone please advise if there is a setting, or something else I am missing to allow this rule. Screenshot 2025-10-09 182319.png Screenshot 2025-10-09 200007 3.png Screenshot 2025-10-09 200007 4.png

      W johnpozJ 2 Replies Last reply Reply Quote 0
      • W Offline
        wifi-will @wifi-will
        last edited by

        Could be assymetric routing?

        https://docs.netgate.com/pfsense/en/latest/troubleshooting/asymmetric-routing.html

        1 Reply Last reply Reply Quote 0
        • johnpozJ Offline
          johnpoz LAYER 8 Global Moderator @wifi-will
          last edited by johnpoz

          @wifi-will why would you be policy routing to get between networks both attached to pfsense?

          If 2 networks are both attached to pfsense, there is no need for a policy route like that.

          A little drawing of how your networks are attached could be helpful in figuring out what you have wrong.

          I assume your guest_net is 10.0.0.0/? and your tv_net is 192.168.40/?

          If 10.x wants to talk to 192.168.x you just need a rule on guest net to allow it - there is no need a gateway set on the rule.

          example: Basic network with pfsense having these 2 networks on it

          basicnetwork.jpg

          Where pfsense IP on each network is .1 in each network. And then clients on said networks with their own IPs in said network, and they point back to pfsense .1 address in their respective networks as their gateway.

          There is no need to add any routers or gateways on pfsense for this to work. The only thing required is the firewall rules on pfsense allows traffic that you want to allow

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

          W 1 Reply Last reply Reply Quote 0
          • W Offline
            wifi-will @johnpoz
            last edited by wifi-will

            @johnpoz the casting server has a nic in each subnet. The casting server handles communication between the two with any traffic destined for the TV subnet form the guest, having to be routed by the casting server gateway. And visa versa from TV to guest. 1000002156.jpg 1000002157.jpg

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @wifi-will
              last edited by johnpoz

              @wifi-will I would have to spend some time looking over that - but what I can tell you right from the hip is multiconnections like that can be problematic when it comes to asymmetrical traffic.

              But from a quick glance - I don't see why you would create gateways on pfsense and policy route. That makes no sense - and quick breeze over - it states 2 isolated networks.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

              W 1 Reply Last reply Reply Quote 0
              • W Offline
                wifi-will @johnpoz
                last edited by

                @johnpoz seem other vendors have no issue just creating static routes between the network. Unfortunately pfsense doesn't allow it because the route is already know. But we still need a rule from TV to Guest via the server as the gateway.

                S 1 Reply Last reply Reply Quote 0
                • S Offline
                  SteveITS Rebel Alliance @wifi-will
                  last edited by

                  @wifi-will A static route is necessary when you're routing to a network behind another router that pfSense has no way of knowing it exists. In your picture a static route isn't needed because pfSense controls both networks.

                  Keep in mind blocked packets in the log might be benign:
                  https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html

                  Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                  Upvote 👍 helpful posts!

                  W 1 Reply Last reply Reply Quote 0
                  • W Offline
                    wifi-will @SteveITS
                    last edited by

                    @SteveITS without the route, all TV's advertise on the guest network and the casting server is not in the middle. With the route, everything works except the reply back to guest.

                    Seems like i have three options. Test the "bypass firewall rules for traffic on the same interface"

                    If no. Try sloppy staye on guest and TV rules?

                    If no. Disable reply to?

                    This has gone right to the top of phillips and the integrators and its been deemed the negate is at fault

                    S 1 Reply Last reply Reply Quote 0
                    • S Offline
                      SteveITS Rebel Alliance @wifi-will
                      last edited by

                      @wifi-will If I follow the above, they are asking for the route to be created with a "source" network so it only applies to some traffic, but pfSense doesn't have that.
                      https://docs.netgate.com/pfsense/en/latest/routing/static.html#static-route-configuration

                      Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                      Upvote 👍 helpful posts!

                      W 1 Reply Last reply Reply Quote 0
                      • W Offline
                        wifi-will @SteveITS
                        last edited by

                        @SteveITS so pfsense can't facilitate this configuration? To be it seems quite simple logically but not with pfsense

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ Offline
                          johnpoz LAYER 8 Global Moderator @wifi-will
                          last edited by johnpoz

                          @wifi-will said in Default Deny Rules:

                          it seems quite simple logically

                          Logically?? Not really - why would you ever do such a thing.. I can tell you in 30+ years in the biz I have never once even had to think about doing such a thing.

                          Such a setup makes no sense logically at all. And for sure would asking for asymmetrical traffic flow. It makes no sense logically to route traffic back out into network X to get to Y when Y is directly connected to the thing that would be sending traffic back into X.

                          If you actually wanted to do such a thing, you would host route it - ie you would put the routes on the hosts in X and tell them go here vs upstream to get to Y.

                          A locally connected network would always have a better metric in the route table than some other route.

                          Why would device in X trying to cast to something in Y not just be able to put in the IP of what they want to cast too in Y, and not have to deal with any sort of "discovery" of where to send traffic in the first place.. Now that would be logical.. And make the casting "server" completely unnecessary. Why does the router have to route traffic back in anyway? The router isn't allowing for mdns discovery.. But their "casting" server would be - so in the discovery of looking for something to cast too.. The casting server should hand back its X IP vs the devices IP in Y. So now when user in X wants to cast to something in Y, it would be sending the traffic to that casting servers IP in the X network, vs having to bounce back off the edge router to the casting server just to send traffic to Y.

                          Client in X says hey looking for something to cast too via some discovery protocol (mdns). Their casting server should say hey I got this stuff you can cast too - send it to me via my IP in X and I will get it to the thing..

                          What if device in X just wants to talk to something in Y that is not casting? It now has to route this normal traffic through the casting server.. Because its normal router would be routing any traffic destined for Y to the casting server in X. But all of this traffic just going to bouncing back and forth off the edge router for zero reason.

                          If you tell your edge router - hey don't send out traffic your directly connected interface to get to Y.. Now when something in Y wants to talk to something else say out on the internet.. Your router sends the traffic out to the internet, but its return traffic the router says oh for me to talk to this Y IP vs sending traffic out my directly connected interface to Y, my routing table says to send it to this device in X?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                          W 1 Reply Last reply Reply Quote 0
                          • W Offline
                            wifi-will @johnpoz
                            last edited by

                            @johnpoz its a simple static route that pfsense is incapable of. Having the route known by the routing table already doesn't help me at all because the guest client device has no idea of the caster server is. Without the rule in place, the guest device picks up all TV's on the network. With the static route in place from guest specifically to the casting server, the guest scans the qr code and only sees the room they are in. The casting server is blocking all mnds discovery for the guest devices and only letting through once the qr code has been scanned. I didn't design this system mate. But I'm just trying to make it work. At the end of the day, pfsense being a state based firewall seems its not capable of doing this and I'm only left with using Ruckus routing code and creating the very basic routes there.

                            Bob.DigB 1 Reply Last reply Reply Quote 0
                            • Bob.DigB Offline
                              Bob.Dig LAYER 8 @wifi-will
                              last edited by

                              @wifi-will said in Default Deny Rules:

                              its a simple static route that pfsense is incapable of

                              If you really think this, you should obviously ask elsewhere for your problem.

                              W 1 Reply Last reply Reply Quote 0
                              • W Offline
                                wifi-will @Bob.Dig
                                last edited by

                                @Bob.Dig once again you guys are not being helpful. Thanks for nothing

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.