I just started playing with Gateway Groups and in the course of doing this I was experimenting with firewall rules for a particular subnet. I soon noticed the rules showing as enabled and disabled were not reflective of what the firewall was actually letting through. My frustration, self-doubt, and confusion ultimately led to this:
http://nothingunreal.com/dump/opnsense.2024-12-07.fwRuleDesync.PNG

I don't have a certificate for https, sorry.
The pings are coming from a VM on my so-called "DMZ" subnet to the OPNsense DMZ interface address. I would expect there to be no reply given the active rules.
I did a bunch of enabling, disabling, and applying of FW rules and rebooting. By no means exhaustive.
Ultimately it seems a rule controlling IPv4 ICMP traffic to an interface address may only get one successful toggle-and-apply but more often none, requiring a reboot for a change to take effect. I confirmed the same behavior on my VM incarnation of OPNsense. Both running 24.7.10_2
I don't mean exclusively "ICMP rules" but creating/enabling a blanket block or reject all protocols to the interface also fails to stop ping replies (as in the screenshot).
Simplest way to reproduce I can suggest is making a rule to pass or block pings to an interface, start a repeating ping from some host, and toggle the rule several times and see if the replies start and stop as you would expect.
I have not noticed unusual behavior from any other rules. They continue to pass or block, enable or disable as expected, on command.
p.s. Just as I'm wrapping up, it occurred to me to try a rule blocking ICMP to an external address. I started a ping to 8.8.4.4 then created a new rule to block the ping. No interruption. Reboot and the pings aren't going through.
http://nothingunreal.com/dump/opnsense.2024-12-07.fwRuleDesync.PNG
I don't have a certificate for https, sorry.
The pings are coming from a VM on my so-called "DMZ" subnet to the OPNsense DMZ interface address. I would expect there to be no reply given the active rules.
- First I checked the automatic rules to see if somehow there was something in there that would let pings through. No, of course not.
- I tried restarting the firewall service via the services widget on the dashboard with no effect.
- I tried option 11 from the console to reload all service with no fix.
- I rebooted the system and then it works as expected and there is no ping reply from the firewall on that subnet.
I did a bunch of enabling, disabling, and applying of FW rules and rebooting. By no means exhaustive.
Ultimately it seems a rule controlling IPv4 ICMP traffic to an interface address may only get one successful toggle-and-apply but more often none, requiring a reboot for a change to take effect. I confirmed the same behavior on my VM incarnation of OPNsense. Both running 24.7.10_2
I don't mean exclusively "ICMP rules" but creating/enabling a blanket block or reject all protocols to the interface also fails to stop ping replies (as in the screenshot).
Simplest way to reproduce I can suggest is making a rule to pass or block pings to an interface, start a repeating ping from some host, and toggle the rule several times and see if the replies start and stop as you would expect.
I have not noticed unusual behavior from any other rules. They continue to pass or block, enable or disable as expected, on command.
p.s. Just as I'm wrapping up, it occurred to me to try a rule blocking ICMP to an external address. I started a ping to 8.8.4.4 then created a new rule to block the ping. No interruption. Reboot and the pings aren't going through.