1
General Discussion / Re: Log traffic only without pass/block/reject
« on: February 28, 2023, 11:11:52 am »
Hi Dennis,
thx for your response and sorry for name mismatch
I've tried your suggestion but it does not work with action "pass" and "quick" disabled.
Here is my example rule:
- Floating Rule for logging but not blocking suspicious traffic only:
The result now is that this rule allows everything to 8.8.8.8.
You can test with "telnet 8.8.8.8 53".
Unfortunately that is not the desired behaviour.
What I wanted to accomplish is that I want to log only that traffic but don't allow more than allowed for other external IPs on the firewall.
Thank you,
Christoph
thx for your response and sorry for name mismatch
I've tried your suggestion but it does not work with action "pass" and "quick" disabled.
Here is my example rule:
- Floating Rule for logging but not blocking suspicious traffic only:
Code: [Select]
action: pass, src: any, dst: 8.8.8.8, log: yes, quick:no
8.8.8.8 is just an example here but it's fine for testing if DNS to Google is not allowed per default on your clients.The result now is that this rule allows everything to 8.8.8.8.
You can test with "telnet 8.8.8.8 53".
Unfortunately that is not the desired behaviour.
What I wanted to accomplish is that I want to log only that traffic but don't allow more than allowed for other external IPs on the firewall.
Thank you,
Christoph