Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    Introducing Netgate Nexus: Multi-Instance Management at Your Fingertips.

    Transparent Filtering Bridge 2.0.3 working

    Scheduled Pinned Locked Moved Firewalling
    6 Posts 3 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G Offline
      gridrun
      last edited by

      …but it takes a reboot to update the ruleset  ???

      Config as per http://people.pharmacy.purdue.edu/~tarrh/Transparent%20Firewall-Filtering%20Bridge%20-%20pfSense%202.0.2%20By%20William%20Tarrh.pdf

      Tech stuff on my blog: http://niston.wordpress.com

      1 Reply Last reply Reply Quote 0
      • G Offline
        gridrun
        last edited by

        To be somewhat more specific: Any changes to the FW ruleset have no effect unless the box (ALIX board) is rebooted. It's unclear to me as to why this should be neccessary?

        Tech stuff on my blog: http://niston.wordpress.com

        1 Reply Last reply Reply Quote 0
        • C Offline
          cmb
          last edited by

          only if you're talking about impact on active connections. You have to kill states if you want already-permitted connections to change/be blocked.

          1 Reply Last reply Reply Quote 0
          • G Offline
            gridrun
            last edited by

            What I still don't understand then is the case marked with a * below:

            Here's the setup:

            A=======FW=======B

            Here's what happens:

            • Station A runs a Ping (ICMP) to station B, which is permitted by the firewall as per rule on the FW interface to A. Ping succeeds.
            • Station B runs a Ping (ICMP, too) to station A, which is not permitted by the FW (no rules on FW interface to B). As expected, this one fails.
            • I remove the ICMP pass rule on FW interface to A
            • The Ping from A to B continues to succeed
            • I add an ICMP pass rule on FW interface to B
            • The Ping from B to A still does not succeed. This is unexpected.
            • The conditions remain for at least 10 minutes (coffee break)
            • I reboot the FW
            • Ping from B to A now succeeds
            • Ping from A to B now fails

            Tech stuff on my blog: http://niston.wordpress.com

            1 Reply Last reply Reply Quote 0
            • B Offline
              bg100
              last edited by

              Firewall rules create in-memory states, that persist until they expire. For as long as the state exists, the traffic will continue to be blocked or passed. Whenever you change firewall rules, and you want to see the effects immediately, you should also reset the states: Diagnostics > States > Reset States > Reset.

              1 Reply Last reply Reply Quote 0
              • G Offline
                gridrun
                last edited by

                I agree on one point: If you delete a rule for an existing connection/flow, then the connection/flow will remain active until states are reset (or the state times out).

                However I don't agree at all on this: If you add a new rule, you should be able to open a connection (or establish a flow) immediately. Once the first packet comes in, the FW should find the matching rule and thereafter create an entry in the state table and allow packets associated with the connection/flow. A state table reset should not be required for this.

                Corroborating my point is the fact that, resetting state tables does not solve my particular problem with this transparent filtering bridge.
                Whenever I add or remove a firewall rule, I have to reboot the box to make the rule change effective.

                Resetting the state table does not change anything.

                Tech stuff on my blog: http://niston.wordpress.com

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.