multicast traffic

Started by caplam, December 19, 2024, 03:43:22 PM

Previous topic - Next topic
December 19, 2024, 03:43:22 PM Last Edit: December 19, 2024, 03:46:36 PM by caplam
i enabled mens repeater on different vlans.

For now I have nothing in vlans other than the firewall interfaces.
IOT,HOME are configured the same way. Both of them have 2 rules 1 for allowing dns traffic and one to allow internet access.
SERVER have only the rule for dns traffic.
Firewall logs tells that
- traffic from iot or home interface is allowed to 224.0.0.251:5353 the rule triggered is "let out anything from firewall host itself" or the rule allowing internet access
- traffic from server interface to 224.0.0.251:5353 is blocked with the message "Default deny / state violation rule"
- there is no traffic from lan to 224.0.0.251

if I add the rule allowing internet access to vlan server the traffic from the firewall interface on server vlan to 224.0.0.251:5353 is allowed by the rule "let out anything from firewall host itself"

I don't understand how it works.

The rules for allowing traffic to internet is as this:
interface: lan, iot, home or server
protocol : ipv4+6
source: lan net, iot net, home net or server net
destination : !private_networks

private_networks is an alias for _lan_network _opt1_network _opt2_network ....
Also I didn't see any rule related to MDNS Repeater. But anyway traffic falls under the rule allowing traffic to internet (eg: not to private networks)

edit: correction
lan traffic to 224.0.0.251 exists but is not logged