• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

UPNP?

2.1 Snapshot Feedback and Problems - RETIRED
6
31
10.6k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jimp Rebel Alliance Developer Netgate
    last edited by Feb 16, 2013, 1:52 AM

    Is igb0 actually your WAN/default route?

    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

    Need help fast? Netgate Global Support!

    Do not Chat/PM for help!

    1 Reply Last reply Reply Quote 0
    • F
      foonus
      last edited by Feb 16, 2013, 2:37 AM Feb 16, 2013, 2:00 AM

      @jimp:

      Is igb0 actually your WAN/default route?

      Yep, igb0 is hooked to the cable router (WAN). Its a simple setup, Intel Gigabit ET2 Quad port server adapter (only using 2 ports -.-) in a HP Proiliant DL380 server.
      igb0 for WAN and igb1 for LAN. No errors show in system log at all.
      As i noted in an earlier post, The only changes to a default pfsense install are selecting "6to4 tunnel" for IPv6 on the WAN, and "track interface" for ipv6 on the LAN. Everything else is set at installer default.

      1 Reply Last reply Reply Quote 0
      • G
        gloomrider
        last edited by Feb 16, 2013, 5:57 PM

        Hi

        I can confirm this issue.  The "transmission" torrent application is a good tester because it both asks UPnP to open the port, then has it probed from the outside to confirm that the port has actually been opened.

        
        [2.1-BETA1][root@xxx.xxx.xxx]/root(1): pfctl -sn -a miniupnpd
        rdr log quick on vr0 inet proto tcp from any to any port = 63839 keep state label "Transmission at 63839" rtable 0 -> 192.168.1.120 port 63839
        rdr log quick on vr0 inet proto udp from any to any port = 63839 keep state label "Transmission at 63839" rtable 0 -> 192.168.1.120 port 63839
        [2.1-BETA1][root@xxx.xxx.xxx]/root(2): pfctl -sr -a miniupnpd
        pass in log quick on vr0 inet proto tcp from any to any port = 63839 flags S/SA keep state label "Transmission at 63839" rtable 0
        pass in log quick on vr0 inet proto udp from any to any port = 63839 flags S/SA keep state label "Transmission at 63839" rtable 0
        
        

        The best way I can describe the issue is that miniupnpd claims to have performed the requested operation, but didn't actually do it.  Or, perhaps pf is now behaving differently (ignoring?) miniupnpd's request.

        My version with issue: 2.1-BETA1 (i386) built on Fri Feb 15 15:43:49 EST 2013

        Reverting back to: 2.1-BETA1 (i386) built on Thu Jan 24 19:53:22 EST 2013

        …resolves the issue

        Same commands in the earlier snapshot (that works):

        
        [2.1-BETA1][root@xxx.xxx.xxx]/root(1): pfctl -sn -a miniupnpd
        rdr log quick on vr0 inet proto tcp from any to any port = 59130 keep state label "Transmission at 59130" rtable 0 -> 192.168.1.120 port 59130
        rdr log quick on vr0 inet proto udp from any to any port = 59130 keep state label "Transmission at 59130" rtable 0 -> 192.168.1.120 port 59130
        [2.1-BETA1][root@xxx.xxx.xxx]/root(2): pfctl -sr -a miniupnpd
        pass in log quick on vr0 inet proto tcp from any to any port = 59130 flags S/SA keep state label "Transmission at 59130" rtable 0
        pass in log quick on vr0 inet proto udp from any to any port = 59130 flags S/SA keep state label "Transmission at 59130" rtable 0
        
        

        NOTE: Port numbers are different because Transmission is assigning random port numbers each time I test.

        I'm happy to run further tests.  Let me know what you want done.

        Thanks

        1 Reply Last reply Reply Quote 0
        • J
          jimp Rebel Alliance Developer Netgate
          last edited by Feb 16, 2013, 7:17 PM

          I updated to the latest snapshot (yesterday's) and I have no problem on i386. uTorrent opens a port and the port test succeeds.

          If the rules are there, it should be working. When UPnP was really broken, there were no rules added there.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator
            last edited by Feb 16, 2013, 8:43 PM Feb 16, 2013, 8:41 PM

            Still not working - showing it blocked in the firewall

            Canyouseeme saying closed..  But clearly the firewall is blocking it - even thouse the pfctl shows rules should be there?

            running
            2.1-BETA1 (i386)
            built on Sat Feb 16 10:53:05 EST 2013
            FreeBSD 8.3-RELEASE-p5

            [2.1-BETA1][root@pfsense.local.lan]/root(1): pfctl -sn -a miniupnpd
            rdr log quick on em1 inet proto tcp from any to any port = 3389 keep state label "test" rtable 0 -> 192.168.1.210 port 3389
            [2.1-BETA1][root@pfsense.local.lan]/root(2): pfctl -sr -a miniupnpd
            pass in log quick on em1 inet proto tcp from any to any port = 3389 flags S/SA keep state label "test" rtable 0

            yes em1 is my wan
            WAN (wan)      -> em1        -> v4/DHCP4: 24.13.snipped/21
                                              v6/DHCP6: 2001:558:6033:12c:snippedf:a3d3/128

            stillblocked.png
            stillblocked.png_thumb

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • T
              Tikimotel
              last edited by Feb 16, 2013, 9:30 PM

              Installed "2.1-BETA1 (amd64) built on Sat Feb 16 10:55:42 EST 2013"
              Still no go on upnp opening ports.

              tested with:
              www.grc.com (shields up!)
              www.canyouseeme.org
              and
              utorrent internal testing option…

              $ pfctl -sn -a miniupnpd
              rdr log quick on em0 inet proto udp from any to any port = 24927 keep state label "Skype UDP at 192.168.0.50:24927 (2238)" rtable 0 -> 192.168.0.50 port 24927
              rdr log quick on em0 inet proto tcp from any to any port = 24927 keep state label "Skype TCP at 192.168.0.50:24927 (2238)" rtable 0 -> 192.168.0.50 port 24927
              
              $ pfctl -sr -a miniupnpd
              pass in log quick on em0 inet proto udp from any to any port = 24927 flags S/SA keep state label "Skype UDP at 192.168.0.50:24927 (2238)" rtable 0
              pass in log quick on em0 inet proto tcp from any to any port = 24927 flags S/SA keep state label "Skype TCP at 192.168.0.50:24927 (2238)" rtable 0
              

              em0 is my WAN

              1 Reply Last reply Reply Quote 0
              • F
                foonus
                last edited by Feb 16, 2013, 11:33 PM

                @johnpoz:

                Still not working - showing it blocked in the firewall

                John, If you set a static port map do you still see packets being blocked as indicated in your screenshot?
                If so this would indicate an issue outside of the miniupnp daemon itself…

                @jimp:

                I updated to the latest snapshot (yesterday's) and I have no problem on i386. uTorrent opens a port and the port test succeeds.

                If the rules are there, it should be working. When UPnP was really broken, there were no rules added there.

                Do you think a clean install would make a difference Jim?

                1 Reply Last reply Reply Quote 0
                • J
                  jimp Rebel Alliance Developer Netgate
                  last edited by Feb 16, 2013, 11:38 PM

                  Unlikely, but possible.

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • G
                    gloomrider
                    last edited by Feb 17, 2013, 12:30 AM

                    Jim,

                    Please don't think I'm being confrontational, but what would it take to prove this issue exists for some of us?

                    1 Reply Last reply Reply Quote 0
                    • J
                      jimp Rebel Alliance Developer Netgate
                      last edited by Feb 17, 2013, 1:30 AM

                      A few things:

                      1. A screenshot of the UPnP status screen showing the client ports that should be open. Use uTorrent or similar that has a built-in test.
                      2. The pfctl commands mentioned above.
                      3. The parsed and raw firewall log entries for the packets that should be matching the rule, but are not.
                      4. The full contents of /tmp/rules.debug, pfctl -vvsr, and pfctl -vvsn
                      5. The contents of netstat -rn
                      6. A screenshot showing that the test failed.
                      7. Repeat the same test with a manual port forward instead of UPnP and see if that works.

                      I don't doubt that it's not working, but given the rest of the context, I'm not entirely sure it's UPnP and not something else just getting blamed on UPnP.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • T
                        Tikimotel
                        last edited by Feb 17, 2013, 10:56 AM

                        A snipped from "/tmp/rules.debug"
                        Why is the miniupnpd anchor not ending in "/*"

                        # Load balancing anchor
                        rdr-anchor "relayd/*"
                        # TFTP proxy
                        rdr-anchor "tftp-proxy/*"
                        
                        # Setup Squid proxy redirect
                        no rdr on em1 proto tcp from any to { 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8 } port 80
                        rdr on em1 proto tcp from any to !(em1) port 80 -> 127.0.0.1 port 3128
                        
                        # UPnPd rdr anchor
                        rdr-anchor "miniupnpd" (Why NOT "miniupnpd/*" ???)
                        
                        anchor "relayd/*"
                        anchor "openvpn/*"
                        anchor "ipsec/*"
                        #---------------------------------------------------------------------------
                        # default deny rules
                        #---------------------------------------------------------------------------
                        

                        pfctl -vvsr results in no anchors named "miniupnpd"

                        $ pfctl -vvsr
                        @0 scrub on em0 all fragment reassemble
                          [ Evaluations: 28002     Packets: 9561      Bytes: 1992949     States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @1 scrub on em1 all fragment reassemble
                          [ Evaluations: 18441     Packets: 18225     Bytes: 3932485     States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @0 anchor "relayd/*" all
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @1 anchor "openvpn/*" all
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @2 anchor "ipsec/*" all
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @3 block drop in inet all label "Default deny rule IPv4"
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @4 block drop out inet all label "Default deny rule IPv4"
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @5 block drop in inet6 all label "Default deny rule IPv6"
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @6 block drop out inet6 all label "Default deny rule IPv6"
                          [ Evaluations: 567       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @7 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @8 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @9 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @10 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @11 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @12 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @13 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @14 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @15 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @16 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @17 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @18 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @19 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @20 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @21 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @22 pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @23 pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @24 pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @25 pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @26 block drop quick inet proto tcp from any port = 0 to any
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @27 block drop quick inet proto tcp from any to any port = 0
                          [ Evaluations: 1904      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @28 block drop quick inet proto udp from any port = 0 to any
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @29 block drop quick inet proto udp from any to any port = 0
                          [ Evaluations: 985       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @30 block drop quick inet6 proto tcp from any port = 0 to any
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @31 block drop quick inet6 proto tcp from any to any port = 0
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @32 block drop quick inet6 proto udp from any port = 0 to any
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @33 block drop quick inet6 proto udp from any to any port = 0
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @34 block drop quick from <snort2c:0> to any label "Block snort2c hosts"
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @35 block drop quick from any to <snort2c:0> label "Block snort2c hosts"
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @36 block drop in log quick proto tcp from <sshlockout:0> to any port = ssh label "sshlockout"
                          [ Evaluations: 2893      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @37 block drop in log quick proto tcp from <webconfiguratorlockout:0> to any port = http label "webConfiguratorlockout"
                          [ Evaluations: 1812      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @38 block drop in quick from <virusprot:0> to any label "virusprot overload table"
                          [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @39 block drop in quick on em0 from <bogons:4652> to any label "block bogon IPv4 networks from WAN"
                          [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @40 block drop in quick on em0 from <bogonsv6:68028> to any label "block bogon IPv6 networks from WAN"
                          [ Evaluations: 139       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @41 block drop in on ! em0 inet from 84.xxx.xxx.0/23 to any
                          [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @42 block drop in inet from 84.xxx.xxx.221 to any
                          [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @43 block drop in on em0 inet6 from fe80::6a05:caff:fe0f:c58 to any
                          [ Evaluations: 2326      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @44 block drop in quick on em0 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
                          [ Evaluations: 139       Packets: 139       Bytes: 50929       States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @45 block drop in quick on em0 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @46 block drop in quick on em0 inet from 100.64.0.0/10 to any label "Block private networks from WAN block 100.64/10"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @47 block drop in quick on em0 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @48 block drop in quick on em0 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @49 block drop in quick on em0 inet6 from fc00::/7 to any label "Block ULA networks from WAN block fc00::/7"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @50 pass in on em0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out WAN"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @51 pass out on em0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN"
                          [ Evaluations: 567       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @52 block drop in on ! em1 inet from 192.168.0.0/24 to any
                          [ Evaluations: 2754      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @53 block drop in inet from 192.168.0.1 to any
                          [ Evaluations: 2187      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @54 block drop in on em1 inet6 from fe80::6a05:caff:fe0f:c59 to any
                          [ Evaluations: 2187      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @55 pass in quick on em1 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
                          [ Evaluations: 2181      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @56 pass in quick on em1 inet proto udp from any port = bootpc to 192.168.0.1 port = bootps keep state label "allow access to DHCP server"
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @57 pass out quick on em1 inet proto udp from 192.168.0.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server"
                          [ Evaluations: 934       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @58 pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
                          [ Evaluations: 2754      Packets: 108       Bytes: 9072        States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @59 pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
                          [ Evaluations: 12        Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @60 pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
                          [ Evaluations: 12        Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @61 pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
                          [ Evaluations: 6         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @62 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
                          [ Evaluations: 2754      Packets: 108       Bytes: 9072        States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @63 pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
                          [ Evaluations: 567       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @64 pass out route-to (em0 84.xxx.xxx.1) inet from 84.xxx.xxx.221 to ! 84.xxx.xxx.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                          [ Evaluations: 567       Packets: 4352      Bytes: 2038614     States: 17    ]
                          [ Inserted: uid 0 pid 73134 ]
                        @65 anchor "userrules/*" all
                          [ Evaluations: 2754      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @66 pass in quick on em1 inet proto tcp from <managementhosts:1> to 192.168.0.1 port = https flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                          [ Evaluations: 2754      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @67 pass in quick on em1 inet proto tcp from <managementhosts:1> to 192.168.0.1 port = ssh flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                          [ Evaluations: 1714      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @68 pass in quick on em1 inet proto tcp from <managementhosts:1> to 192.168.0.1 port = http flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                          [ Evaluations: 1714      Packets: 1197      Bytes: 890290      States: 2     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @69 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = domain flags S/SA keep state label "USER_RULE: Allow internal network to DNS forwarder"
                          [ Evaluations: 1694      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @70 pass in quick on em1 inet proto udp from 192.168.0.0/24 to 192.168.0.1 port = domain keep state label "USER_RULE: Allow internal network to DNS forwarder"
                          [ Evaluations: 369       Packets: 628       Bytes: 66445       States: 1     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @71 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = ntp flags S/SA keep state label "USER_RULE: Allow internal network to NTPd server"
                          [ Evaluations: 1696      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @72 pass in quick on em1 inet proto udp from 192.168.0.0/24 to 192.168.0.1 port = ntp keep state label "USER_RULE: Allow internal network to NTPd server"
                          [ Evaluations: 2         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @73 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = 2189 flags S/SA keep state label "USER_RULE: Allow internal network to upnp and nat-pmp"
                          [ Evaluations: 1696      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @74 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = 5153 flags S/SA keep state label "USER_RULE: Allow internal network to upnp and nat-pmp"
                          [ Evaluations: 1694      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @75 pass in quick on em1 inet from 192.168.0.0/24 to 224.0.0.0/8 flags S/SA keep state label "USER_RULE: Allow multicast"
                          [ Evaluations: 1847      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @76 pass in quick on em1 inet from 192.168.0.0/24 to 239.0.0.0/30 flags S/SA keep state label "USER_RULE: Allow multicast"
                          [ Evaluations: 1847      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @77 pass in quick on em1 inet proto icmp from 192.168.0.0/24 to 192.168.0.1 keep state label "USER_RULE: Allow internal network to ping LAN IP"
                          [ Evaluations: 1847      Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @78 block drop in quick on em1 inet from any to 192.168.0.1 label "USER_RULE: Reject all else to LAN IP"
                          [ Evaluations: 1847      Packets: 1694      Bytes: 86336       States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @79 pass in quick on em1 inet from 192.168.0.0/24 to any flags S/SA keep state label "USER_RULE: Default LAN -> any"
                          [ Evaluations: 153       Packets: 4824      Bytes: 2762700     States: 18    ]
                          [ Inserted: uid 0 pid 73134 ]
                        @80 anchor "tftp-proxy/*" all
                          [ Evaluations: 573       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @81 pass in quick on em1 proto tcp from any to ! (em1:2) port = http flags S/SA keep state
                          [ Evaluations: 573       Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]
                        @82 pass in quick on em1 proto tcp from any to ! (em1:2) port = 3128 flags S/SA keep state
                          [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                          [ Inserted: uid 0 pid 73134 ]</managementhosts:1></managementhosts:1></managementhosts:1></bogonsv6:68028></bogons:4652></virusprot:0></webconfiguratorlockout:0></sshlockout:0></snort2c:0></snort2c:0>
                        
                        $ pfctl -sn -a miniupnpd
                        rdr log quick on em0 inet proto udp from any to any port = 17040 keep state label "Skype UDP at 192.168.0.51:17040 (2239)" rtable 0 -> 192.168.0.51 port 17040
                        rdr log quick on em0 inet proto tcp from any to any port = 17040 keep state label "Skype TCP at 192.168.0.51:17040 (2239)" rtable 0 -> 192.168.0.51 port 17040
                        
                        1 Reply Last reply Reply Quote 0
                        • J
                          johnpoz LAYER 8 Global Moderator
                          last edited by Feb 17, 2013, 12:17 PM

                          So yeah if I do a manual nat - its works no problem, see attached

                          canyouseeme goes back to 80 when you do the test, but clearly in the ouput you see that its saying 3389 is open  to the public.  When UPnP says that it opens this port, firewall blocks it and canyouseeme reports closed/timeout/etc.

                          nat.png
                          nat.png_thumb
                          staticworks.png
                          staticworks.png_thumb

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • A
                            athurdent
                            last edited by Feb 17, 2013, 12:49 PM Feb 17, 2013, 12:44 PM

                            @Tikimotel:

                            Why is the miniupnpd anchor not ending in "/*"

                            The INSTALL file of the source code (miniupnpd-1.8.20130207.tar.gz) suggests the following:

                            - add "rdr-anchor miniupnpd" and "anchor miniupnpd" lines to /etc/pf.conf
                            - some FreeBSD users reported that it is also necessary for them
                              to explicitly allow udp traffic on 239.0.0.0/8 by adding the two following
                              lines to /etc/pf.conf :
                               pass out on $int_if from any to 239.0.0.0/8 keep state
                               pass in on $int_if from any to 239.0.0.0/8 keep state
                            
                            pfctl -vvsn
                            

                            show the following on my system:

                            @7 rdr-anchor "miniupnpd" all
                              [ Evaluations: 46940     Packets: 0         Bytes: 0           States: 0     ]
                              [ Inserted: uid 0 pid 48152 ]
                            

                            But I am no using UPNP, so that's OK.
                            Would be interesting to see, if your systems show non-zero values there.

                            Edit: and it would be good to have the actual raw firewall logs of the blocked traffic.

                            1 Reply Last reply Reply Quote 0
                            • T
                              Tikimotel
                              last edited by Feb 17, 2013, 1:45 PM Feb 17, 2013, 1:19 PM

                              the INSTALL file says to add both, rdr-anchor and anchor entries.

                              pfctl -vvsn

                              $ pfctl -vvsn
                              @0 no nat proto carp all
                                [ Evaluations: 13505     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @1 nat-anchor "natearly/*" all
                                [ Evaluations: 13505     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @2 nat-anchor "natrules/*" all
                                [ Evaluations: 13505     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @3 nat on em0 inet from 192.168.0.0/24 port = isakmp to any port = isakmp -> 84.xxx.xx3.221 port 500
                                [ Evaluations: 13505     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @4 nat on em0 inet from 127.0.0.0/8 port = isakmp to any port = isakmp -> 84.xxx.xx3.221 port 500
                                [ Evaluations: 883       Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @5 nat on em0 inet from 192.168.0.0/24 to any -> 84.xxx.xx3.221 port 1024:65535
                                [ Evaluations: 13457     Packets: 4057605   Bytes: 3705179324  States: 267   ]
                                [ Inserted: uid 0 pid 31155 ]
                              @6 nat on em0 inet from 127.0.0.0/8 to any -> 84.xxx.xx3.221 port 1024:65535
                                [ Evaluations: 883       Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @0 no rdr proto carp all
                                [ Evaluations: 28718     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @1 rdr-anchor "relayd/*" all
                                [ Evaluations: 28718     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @2 rdr-anchor "tftp-proxy/*" all
                                [ Evaluations: 28718     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @3 no rdr on em1 inet proto tcp from any to 192.168.0.0/16 port = http
                                [ Evaluations: 28718     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @4 no rdr on em1 inet proto tcp from any to 172.16.0.0/12 port = http
                                [ Evaluations: 5241      Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @5 no rdr on em1 inet proto tcp from any to 10.0.0.0/8 port = http
                                [ Evaluations: 5241      Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @6 rdr on em1 inet proto tcp from any to ! (em1:1) port = http -> 127.0.0.1 port 3128
                                [ Evaluations: 5241      Packets: 5044      Bytes: 3257109     States: 1     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @7 rdr-anchor "miniupnpd" all
                                [ Evaluations: 28566     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              
                              

                              pfctl -vvsr

                              $ pfctl -vvsr
                              @0 scrub on em0 all fragment reassemble
                                [ Evaluations: 14128596  Packets: 7067707   Bytes: 986362156   States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @1 scrub on em1 all fragment reassemble
                                [ Evaluations: 7060889   Packets: 7060521   Bytes: 989205780   States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @0 anchor "relayd/*" all
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @1 anchor "openvpn/*" all
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @2 anchor "ipsec/*" all
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @3 block drop in log inet all label "Default deny rule IPv4"
                                [ Evaluations: 39657     Packets: 12604     Bytes: 796042      States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @4 block drop out log inet all label "Default deny rule IPv4"
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @5 block drop in log inet6 all label "Default deny rule IPv6"
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @6 block drop out log inet6 all label "Default deny rule IPv6"
                                [ Evaluations: 12655     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @7 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @8 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @9 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @10 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @11 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @12 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @13 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @14 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @15 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @16 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @17 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @18 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @19 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @20 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @21 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @22 pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @23 pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @24 pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @25 pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @26 block drop quick inet proto tcp from any port = 0 to any
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @27 block drop quick inet proto tcp from any to any port = 0
                                [ Evaluations: 18915     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @28 block drop quick inet proto udp from any port = 0 to any
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @29 block drop quick inet proto udp from any to any port = 0
                                [ Evaluations: 20680     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @30 block drop quick inet6 proto tcp from any port = 0 to any
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @31 block drop quick inet6 proto tcp from any to any port = 0
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @32 block drop quick inet6 proto udp from any port = 0 to any
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @33 block drop quick inet6 proto udp from any to any port = 0
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @34 block drop quick from <snort2c:0>to any label "Block snort2c hosts"
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @35 block drop quick from any to <snort2c:0>label "Block snort2c hosts"
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @36 block drop in log quick proto tcp from <sshlockout:0>to any port = ssh label "sshlockout"
                                [ Evaluations: 39657     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @37 block drop in log quick proto tcp from <webconfiguratorlockout:0>to any port = http label "webConfiguratorlockout"
                                [ Evaluations: 14044     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @38 block drop in quick from <virusprot:0>to any label "virusprot overload table"
                                [ Evaluations: 27002     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @39 block drop in log quick on em0 from <bogons:10>to any label "block bogon IPv4 networks from WAN"
                                [ Evaluations: 27002     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @40 block drop in log quick on em0 from <bogonsv6:0>to any label "block bogon IPv6 networks from WAN"
                                [ Evaluations: 12846     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @41 block drop in on ! em0 inet from 84.xxx.xx2.0/23 to any
                                [ Evaluations: 27002     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @42 block drop in inet from 84.xxx.xx3.221 to any
                                [ Evaluations: 27002     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @43 block drop in on em0 inet6 from fe80::6a05:caff:fe0f:c58 to any
                                [ Evaluations: 27002     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @44 block drop in log quick on em0 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
                                [ Evaluations: 12846     Packets: 242       Bytes: 89350       States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @45 block drop in log quick on em0 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
                                [ Evaluations: 12604     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @46 block drop in log quick on em0 inet from 100.64.0.0/10 to any label "Block private networks from WAN block 100.64/10"
                                [ Evaluations: 12604     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @47 block drop in log quick on em0 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
                                [ Evaluations: 12604     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @48 block drop in log quick on em0 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"
                                [ Evaluations: 12604     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @49 block drop in log quick on em0 inet6 from fc00::/7 to any label "Block ULA networks from WAN block fc00::/7"
                                [ Evaluations: 12604     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @50 pass in on em0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out WAN"
                                [ Evaluations: 12604     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @51 pass out on em0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN"
                                [ Evaluations: 18042     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @52 block drop in on ! em1 inet from 192.168.0.0/24 to any
                                [ Evaluations: 39415     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @53 block drop in inet from 192.168.0.1 to any
                                [ Evaluations: 26783     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @54 block drop in on em1 inet6 from fe80::6a05:caff:fe0f:c59 to any
                                [ Evaluations: 26760     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @55 pass in quick on em1 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
                                [ Evaluations: 14132     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @56 pass in quick on em1 inet proto udp from any port = bootpc to 192.168.0.1 port = bootps keep state label "allow access to DHCP server"
                                [ Evaluations: 2         Packets: 3         Bytes: 1232        States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @57 pass out quick on em1 inet proto udp from 192.168.0.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server"
                                [ Evaluations: 19931     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @58 pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
                                [ Evaluations: 39413     Packets: 184       Bytes: 14796       States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @59 pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
                                [ Evaluations: 48        Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @60 pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
                                [ Evaluations: 48        Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @61 pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
                                [ Evaluations: 24        Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @62 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
                                [ Evaluations: 39413     Packets: 1502      Bytes: 388250      States: 2     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @63 pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
                                [ Evaluations: 12655     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @64 pass out route-to (em0 84.xxx.xx2.1) inet from 84.xxx.xx3.221 to ! 84.xxx.xx2.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                                [ Evaluations: 12655     Packets: 4049547   Bytes: 3701333567  States: 177   ]
                                [ Inserted: uid 0 pid 31155 ]
                              @65 anchor "userrules/*" all
                                [ Evaluations: 39413     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @66 pass in quick on em1 inet proto tcp from <managementhosts:1>to 192.168.0.1 port = https flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                                [ Evaluations: 39413     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @67 pass in quick on em1 inet proto tcp from <managementhosts:1>to 192.168.0.1 port = ssh flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                                [ Evaluations: 1987      Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @68 pass in quick on em1 inet proto tcp from <managementhosts:1>to 192.168.0.1 port = http flags S/SA keep state label "USER_RULE: Allow access to firewall management"
                                [ Evaluations: 1987      Packets: 2933      Bytes: 2349344     States: 2     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @69 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = domain flags S/SA keep state label "USER_RULE: Allow internal network to DNS forwarder"
                                [ Evaluations: 1960      Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @70 pass in quick on em1 inet proto udp from 192.168.0.0/24 to 192.168.0.1 port = domain keep state label "USER_RULE: Allow internal network to DNS forwarder"
                                [ Evaluations: 7279      Packets: 940       Bytes: 91307       States: 5     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @71 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = ntp flags S/SA keep state label "USER_RULE: Allow internal network to NTPd server"
                                [ Evaluations: 1968      Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @72 pass in quick on em1 inet proto udp from 192.168.0.0/24 to 192.168.0.1 port = ntp keep state label "USER_RULE: Allow internal network to NTPd server"
                                [ Evaluations: 8         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @73 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = 2189 flags S/SA keep state label "USER_RULE: Allow internal network to upnp and nat-pmp"
                                [ Evaluations: 1968      Packets: 452       Bytes: 90991       States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @74 pass in quick on em1 inet proto tcp from 192.168.0.0/24 to 192.168.0.1 port = 5153 flags S/SA keep state label "USER_RULE: Allow internal network to upnp and nat-pmp"
                                [ Evaluations: 1921      Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @75 pass in quick on em1 inet from 192.168.0.0/24 to 224.0.0.0/8 flags S/SA keep state label "USER_RULE: Allow multicast"
                                [ Evaluations: 13597     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @76 pass in quick on em1 inet from 192.168.0.0/24 to 239.0.0.0/30 flags S/SA keep state label "USER_RULE: Allow multicast"
                                [ Evaluations: 13597     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @77 pass in quick on em1 inet proto icmp from 192.168.0.0/24 to 192.168.0.1 keep state label "USER_RULE: Allow internal network to ping LAN IP"
                                [ Evaluations: 13597     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @78 block drop in quick on em1 inet from any to 192.168.0.1 label "USER_RULE: Reject all else to LAN IP"
                                [ Evaluations: 13597     Packets: 1926      Bytes: 98442       States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @79 pass in quick on em1 inet from 192.168.0.0/24 to any flags S/SA keep state label "USER_RULE: Default LAN -> any"
                                [ Evaluations: 11671     Packets: 4049388   Bytes: 3702156825  States: 164   ]
                                [ Inserted: uid 0 pid 31155 ]
                              @80 anchor "tftp-proxy/*" all
                                [ Evaluations: 25283     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @81 pass in quick on em1 proto tcp from any to ! (em1:2) port = http flags S/SA keep state
                                [ Evaluations: 25283     Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]
                              @82 pass in quick on em1 proto tcp from any to ! (em1:2) port = 3128 flags S/SA keep state
                                [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                [ Inserted: uid 0 pid 31155 ]</managementhosts:1></managementhosts:1></managementhosts:1></bogonsv6:0></bogons:10></virusprot:0></webconfiguratorlockout:0></sshlockout:0></snort2c:0></snort2c:0> 
                              

                              That is with utorrent opening 22425 (tcp/udp) using upnp. (internal utorrent portforwarding test states OK, but traffic get blocked by the default rule)
                              RAW firewall logging

                              Feb 17 14:29:10	pf: 208.94.246.12.59207 > 84.xxx.xxx.xxx.52631: Flags [s], cksum 0x8c13 (correct), seq 3040150792, win 7300, options [mss 1460,sackOK,TS val 93819911 ecr 0,nop,wscale 0], length 0
                              Feb 17 14:29:10	pf: 00:00:00.032232 rule 3/0(match): block in on em0: (tos 0x0, ttl 52, id 37135, offset 0, flags [DF], proto TCP (6), length 60)
                              Feb 17 14:29:10	pf: 90.38.197.137.61089 > 192.168.0.51.22425: Flags [s], cksum 0x8c47 (correct), seq 106599862, win 8192, options [mss 1452,nop,wscale 2,nop,nop,sackOK], length 0
                              Feb 17 14:29:10	pf: 00:00:00.000701 rule 3/0(match): block in on em0: (tos 0x0, ttl 115, id 20243, offset 0, flags [DF], proto TCP (6), length 52)
                              Feb 17 14:29:10	pf: 90.38.197.137.28344 > 192.168.0.51.22425: UDP, length 30
                              Feb 17 14:29:10	pf: 00:00:00.007670 rule 3/0(match): block in on em0: (tos 0x0, ttl 115, id 20242, offset 0, flags [none], proto UDP (17), length 58)
                              Feb 17 14:29:10	pf: 213.220.227.57.53390 > 192.168.0.51.22425: Flags [s], cksum 0x43d8 (correct), seq 3521645254, win 8960, options [mss 8960,sackOK,TS val 120667621 ecr 0,nop,wscale 4], length 0
                              Feb 17 14:29:10	pf: 00:00:00.040965 rule 3/0(match): block in on em0: (tos 0x0, ttl 54, id 14115, offset 0, flags [DF], proto TCP (6), length 60)
                              Feb 17 14:29:10	pf: 77.41.15.219.55721 > 84.xxx.xxx.xxx.46657: UDP, length 20
                              Feb 17 14:29:10	pf: 00:00:00.750937 rule 3/0(match): block in on em0: (tos 0x0, ttl 115, id 28101, offset 0, flags [none], proto UDP (17), length 48)
                              Feb 17 14:29:10	pf: 95.236.57.133.18746 > 192.168.0.51.22425: Flags [s], cksum 0x113d (correct), seq 2237709668, win 8192, options [mss 1442,nop,wscale 8,nop,nop,sackOK], length 0
                              netstat -rn
                              [code]$ netstat -rn
                              Routing tables
                              
                              Internet:
                              Destination        Gateway            Flags    Refs      Use  Netif Expire
                              default            84.xxx.xx2.1       UGS         0   174916    em0
                              84.xxx.xx2.0/23    link#1             U           0      704    em0
                              84.xxx.xx3.221     link#1             UHS         0        0    lo0
                              127.0.0.1          link#5             UH          0       58    lo0
                              192.168.0.0/24     link#2             U           0  7241831    em1
                              192.168.0.1        link#2             UHS         0      832    lo0
                              
                              Internet6:
                              Destination                       Gateway                       Flags      Netif Expire
                              ::1                               ::1                           UH          lo0
                              fe80::%em0/64                     link#1                        U           em0
                              fe80::6a05:caff:fe0f:c58%em0      link#1                        UHS         lo0
                              fe80::%em1/64                     link#2                        U           em1
                              fe80::6a05:caff:fe0f:c59%em1      link#2                        UHS         lo0
                              fe80::%lo0/64                     link#5                        U           lo0
                              fe80::1%lo0                       link#5                        UHS         lo0
                              ff01::%em0/32                     fe80::6a05:caff:fe0f:c58%em0  U           em0
                              ff01::%em1/32                     fe80::6a05:caff:fe0f:c59%em1  U           em1
                              ff01::%lo0/32                     ::1                           U           lo0
                              ff02::%em0/32                     fe80::6a05:caff:fe0f:c58%em0  U           em0
                              ff02::%em1/32                     fe80::6a05:caff:fe0f:c59%em1  U           em1
                              ff02::%lo0/32                     ::1                           U           lo0[/code]
                              cat /tmp/rules.debug
                              [code]$ cat /tmp/rules.debug
                              set limit tables 3000
                              set optimization normal
                              set timeout { adaptive.start 0, adaptive.end 0 }
                              set limit states 894000
                              set limit src-nodes 894000
                              
                              #System aliases
                              
                              loopback = "{ lo0 }"
                              WAN = "{ em0 }"
                              LAN = "{ em1 }"
                              
                              #SSH Lockout Table
                              table <sshlockout> persist
                              table <webconfiguratorlockout> persist
                              #Snort tables
                              table <snort2c>
                              table <virusprot>
                              table <negate_networks> 
                              
                              # User Aliases 
                              table <managementhosts> {   192.168.0.0/25 } 
                              ManagementHosts = "<managementhosts>"
                              ManagementPorts = "{   443  22  80 }"
                              ProxyPorts = "{   3128 }"
                              UpnpPorts = "{   2189  5153 }"
                              
                              # Gateways
                              GWWAN = " route-to ( em0 84.xxx.xx2.1 ) "
                              
                              set loginterface em1
                              
                              set skip on pfsync0
                              
                              scrub on $WAN all    fragment reassemble
                              scrub on $LAN all    fragment reassemble
                              
                              no nat proto carp
                              no rdr proto carp
                              nat-anchor "natearly/*"
                              nat-anchor "natrules/*"
                              
                              # Outbound NAT rules
                              
                              # Subnets to NAT 
                              tonatsubnets	= "{ 192.168.0.0/24 127.0.0.0/8  }"
                              nat on $WAN  from $tonatsubnets port 500 to any port 500 -> 84.xxx.xx3.221/32 port 500  
                              nat on $WAN  from $tonatsubnets to any -> 84.xxx.xx3.221/32 port 1024:65535  
                              
                              # Load balancing anchor
                              rdr-anchor "relayd/*"
                              # TFTP proxy
                              rdr-anchor "tftp-proxy/*"
                              
                              # Setup Squid proxy redirect
                              no rdr on em1 proto tcp from any to { 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8 } port 80
                              rdr on em1 proto tcp from any to !(em1) port 80 -> 127.0.0.1 port 3128
                              
                              # UPnPd rdr anchor
                              rdr-anchor "miniupnpd"
                              
                              anchor "relayd/*"
                              anchor "openvpn/*"
                              anchor "ipsec/*"
                              #---------------------------------------------------------------------------
                              # default deny rules
                              #---------------------------------------------------------------------------
                              block in log inet all label "Default deny rule IPv4"
                              block out log inet all label "Default deny rule IPv4"
                              block in log inet6 all label "Default deny rule IPv6"
                              block out log inet6 all label "Default deny rule IPv6"
                              
                              # IPv6 ICMP is not auxilary, it is required for operation
                              # See man icmp6(4)
                              # 1    unreach         Destination unreachable
                              # 2    toobig          Packet too big
                              # 128  echoreq         Echo service request
                              # 129  echorep         Echo service reply
                              # 133  routersol       Router solicitation
                              # 134  routeradv       Router advertisement
                              # 135  neighbrsol      Neighbor solicitation
                              # 136  neighbradv      Neighbor advertisement
                              pass quick inet6 proto ipv6-icmp from any to any icmp6-type {1,2,135,136} keep state
                              
                              # Allow only bare essential icmpv6 packets (NS, NA, and RA, echoreq, echorep)
                              pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {129,133,134,135,136} keep state
                              pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {129,133,134,135,136} keep state
                              pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
                              pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
                              pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {128,133,134,135,136} keep state
                              
                              # We use the mighty pf, we cannot be fooled.
                              block quick inet proto { tcp, udp } from any port = 0 to any
                              block quick inet proto { tcp, udp } from any to any port = 0
                              block quick inet6 proto { tcp, udp } from any port = 0 to any
                              block quick inet6 proto { tcp, udp } from any to any port = 0
                              
                              # Snort package
                              block quick from <snort2c> to any label "Block snort2c hosts"
                              block quick from any to <snort2c> label "Block snort2c hosts"
                              
                              # SSH lockout
                              block in log quick proto tcp from <sshlockout> to any port 22 label "sshlockout"
                              
                              # webConfigurator lockout
                              block in log quick proto tcp from <webconfiguratorlockout> to any port 80 label "webConfiguratorlockout"
                              block in quick from <virusprot> to any label "virusprot overload table"
                              table <bogons> persist file "/etc/bogons"
                              table <bogonsv6> persist file "/etc/bogonsv6"
                              # block bogon networks
                              # http://www.cymru.com/Documents/bogon-bn-nonagg.txt
                              # http://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt
                              block in log quick on $WAN from <bogons> to any label "block bogon IPv4 networks from WAN"
                              block in log quick on $WAN from <bogonsv6> to any label "block bogon IPv6 networks from WAN"
                              antispoof for em0
                              # block anything from private networks on interfaces with the option set
                              antispoof for $WAN
                              block in log quick on $WAN from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
                              block in log quick on $WAN from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
                              block in log quick on $WAN from 100.64.0.0/10 to any label "Block private networks from WAN block 100.64/10"
                              block in log quick on $WAN from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
                              block in log quick on $WAN from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"
                              block in log quick on $WAN from fc00::/7 to any label "Block ULA networks from WAN block fc00::/7"
                              # allow our DHCP client out to the WAN
                              pass in on $WAN proto udp from any port = 67 to any port = 68 label "allow dhcp client out WAN"
                              pass out on $WAN proto udp from any port = 68 to any port = 67 label "allow dhcp client out WAN"
                              # Not installing DHCP server firewall rules for WAN which is configured for DHCP.
                              antispoof for em1
                              # allow access to DHCP server on LAN
                              pass in quick on $LAN proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server"
                              pass in quick on $LAN proto udp from any port = 68 to 192.168.0.1 port = 67 label "allow access to DHCP server"
                              pass out quick on $LAN proto udp from 192.168.0.1 port = 67 to any port = 68 label "allow access to DHCP server"
                              
                              # loopback
                              pass in on $loopback inet all label "pass IPv4 loopback"
                              pass out on $loopback inet all label "pass IPv4 loopback"
                              pass in on $loopback inet6 all label "pass IPv6 loopback"
                              pass out on $loopback inet6 all label "pass IPv6 loopback"
                              # let out anything from the firewall host itself and decrypted IPsec traffic
                              pass out inet all keep state allow-opts label "let out anything IPv4 from firewall host itself"
                              pass out inet6 all keep state allow-opts label "let out anything IPv6 from firewall host itself"
                              pass out route-to ( em0 84.xxx.xx2.1 ) from 84.xxx.xx3.221 to !84.xxx.xx2.0/23 keep state allow-opts label "let out anything from firewall host itself"
                              
                              # User-defined rules follow
                              
                              anchor "userrules/*"
                              pass  in  quick  on $LAN  proto tcp  from   $ManagementHosts to 192.168.0.1 port $ManagementPorts  flags S/SA keep state  label "USER_RULE: Allow access to firewall management"
                              pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.0.0/24 to 192.168.0.1 port 53  keep state  label "USER_RULE: Allow internal network to DNS forwarder"
                              pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.0.0/24 to 192.168.0.1 port 123  keep state  label "USER_RULE: Allow internal network to NTPd server"
                              pass  in  quick  on $LAN  proto tcp  from 192.168.0.0/24 to 192.168.0.1 port $UpnpPorts  flags S/SA keep state  label "USER_RULE: Allow internal network to upnp and nat-pmp"
                              pass  in  quick  on $LAN  from 192.168.0.0/24 to   224.0.0.0/8 keep state  label "USER_RULE: Allow multicast"
                              pass  in  quick  on $LAN  from 192.168.0.0/24 to   239.0.0.0/30 keep state  label "USER_RULE: Allow multicast"
                              pass  in  quick  on $LAN  proto icmp  from 192.168.0.0/24 to 192.168.0.1 keep state  label "USER_RULE: Allow internal network to ping LAN IP"
                              block  in  quick  on $LAN  from any to 192.168.0.1  label "USER_RULE: Reject all else to LAN IP"
                              pass  in  quick  on $LAN  from 192.168.0.0/24 to any keep state  label "USER_RULE: Default LAN -> any"
                              
                              # Automatic Pass rules for any delegated IPv6 prefixes through dynamic IPv6 clients
                              
                              # VPN Rules
                              anchor "tftp-proxy/*"
                              
                              # Setup squid pass rules for proxy
                              pass in quick on em1 proto tcp from any to !(em1) port 80 flags S/SA keep state
                              pass in quick on em1 proto tcp from any to !(em1) port 3128 flags S/SA keep state
                              [/code]
                              
                              ![Utorrent-test.png](/public/_imported_attachments_/1/Utorrent-test.png)
                              ![Utorrent-test.png_thumb](/public/_imported_attachments_/1/Utorrent-test.png_thumb)
                              ![pfsense_unpnstatus.png](/public/_imported_attachments_/1/pfsense_unpnstatus.png)
                              ![pfsense_unpnstatus.png_thumb](/public/_imported_attachments_/1/pfsense_unpnstatus.png_thumb)[/s][/s][/s][/s]</bogonsv6></bogons></bogonsv6></bogons></virusprot></webconfiguratorlockout></sshlockout></snort2c></snort2c></managementhosts></managementhosts></negate_networks></virusprot></snort2c></webconfiguratorlockout></sshlockout>
                              
                              1 Reply Last reply Reply Quote 0
                              • J
                                jimp Rebel Alliance Developer Netgate
                                last edited by Mar 11, 2013, 11:45 AM Feb 17, 2013, 1:59 PM

                                OK, I found it. It wasn't the upnp daemon, but a recent change broke the test that puts the rules anchor in rules.debug.

                                Should be fixed by https://github.com/pfsense/pfsense/commit/290296cdc05747b65145077e2715e7c4e2ae60aa

                                Not sure how mine worked without that anchor, but it was working for me.

                                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                Need help fast? Netgate Global Support!

                                Do not Chat/PM for help!

                                1 Reply Last reply Reply Quote 0
                                • J
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by Feb 17, 2013, 2:31 PM Feb 17, 2013, 2:26 PM

                                  just did a gitsync - and shazam there you go Working!

                                  I don't really use it, but sure the guys that do will be happy its working again..  Sweet how some reporting of details and issue fixed..

                                  Got to love the pfsense crew!  Thanks guys!!

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    Tikimotel
                                    last edited by Feb 17, 2013, 2:54 PM

                                    gitsync saved the day!
                                    miniupnpd is working again thanks. ;D

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      gloomrider
                                      last edited by Feb 18, 2013, 1:01 AM Feb 18, 2013, 12:45 AM

                                      @jimp:

                                      OK, I found it. It wasn't the upnp daemon, but a recent change broke the test that puts the rules anchor in rules.debug.

                                      Should be fixed by https://github.com/bsdperimeter/pfsense/commit/290296cdc05747b65145077e2715e7c4e2ae60aa

                                      Not sure how mine worked without that anchor, but it was working for me.

                                      Well Jim, since you figured it out before I had to go through your list of tasks, I made a small donation to the project.  ;D

                                      Oh, and thanks, of course!!!

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jimp Rebel Alliance Developer Netgate
                                        last edited by Feb 18, 2013, 12:57 AM

                                        Thanks!

                                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                        Need help fast? Netgate Global Support!

                                        Do not Chat/PM for help!

                                        1 Reply Last reply Reply Quote 0
                                        • F
                                          foonus
                                          last edited by Feb 19, 2013, 3:25 AM

                                          @johnpoz:

                                          just did a gitsync - and shazam there you go Working!

                                          I don't really use it, but sure the guys that do will be happy its working again..  Sweet how some reporting of details and issue fixed..

                                          Got to love the pfsense crew!  Thanks guys!!

                                          Yep, quite impressive, Everything running smoothly, cant ask for more.

                                          1 Reply Last reply Reply Quote 0
                                          21 out of 31
                                          • First post
                                            21/31
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.