pfctl -s rules -vv | more
@8 block drop in log on ! ixl1 inet from 10.x.x.0/24 to any [ Evaluations: 656632 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 33106 State Creations: 0 ]
root@home-opnsense:~ # pfctl -s rules -vv | grep -A 2 ^@8\ blockNo ALTQ support in kernelALTQ related functions disabled@8 block drop in log inet all label "02f4bab031b57d1e30553ce08e0ec131" [ Evaluations: 160 Packets: 24 Bytes: 1872 States: 0 ] [ Inserted: uid 0 pid 55655 State Creations: 0 ]
igb1: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 description: LAN (opt17) options=4802028<VLAN_MTU,JUMBO_MTU,WOL_MAGIC,NOMAP> ether 20:7c:14:f0:8b:68 inet 192.168.0.242 netmask 0xffffff00 broadcast 192.168.0.255 media: Ethernet autoselect (1000baseT <full-duplex>) status: active nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
root@home-opnsense:~ # netstat -rnRouting tablesInternet:Destination Gateway Flags Netif Expiredefault 192.168.0.1 UGS igb110.66.100.0/25 link#28 U bridge310.66.100.1 link#28 UHS lo0127.0.0.1 link#10 UH lo0172.20.66.0/24 link#26 U bridge1172.20.66.1 link#26 UHS lo0172.31.254.0/29 link#29 U bridge0172.31.254.1 link#29 UHS lo0192.168.0.0/24 link#2 U igb1192.168.0.242 link#2 UHS lo0Internet6:Destination Gateway Flags Netif Expire::1 link#10 UHS lo0fe80::%lo0/64 link#10 U lo0fe80::1%lo0 link#10 UHS lo0
pass in log quick on ixl1 proto tcp from any to (self) port = ssh flags S/SA keep state label "8fca0220658675898f50f640b033aa0e"pass in log quick on ixl1 proto tcp from any to (self) port = https flags S/SA keep state label "8fca0220658675898f50f640b033aa0e"
Or, maybe, the pf macro for (self) is not matching your 192.168.0.242 if the anti-lockout rules are present... either way, it seems to be getting caught by the default drop rule. So something isn't matching an allow rule.
net.link.bridge.pfil_bridge 1net.link.bridge.pfil_member 0
just out of curiosity I added the allow any/any IPv4 rule to floating. And tada I can still access if pfctl -eSo for whatever reason the rules on LAN are not evaluated/applied. Any idea what could be the reason for ignoring the rules on LAN. LAN interface is definitely the right one: the one that the traffic comes in (igb1). Can I somehow check with pfctl that the rules shown under LAN in GUI are really bound to the right interface? Even if I configure that floating rule explicitly to LAN interface the access still works
pass in quick on igb1 reply-to (igb1 192.168.0.1) inet all flags S/SA keep state label "d038f19d181257facbfb9dfd06f5ba32"pass out quick on igb1 reply-to (igb1 192.168.0.1) inet all flags S/SA keep state label "c38c9c05eb93a192eb2580dde7a38c15"
reply-to (igb1 192.168.0.1)
@217 pass in quick on ixl3 inet all flags S/SA keep state label "b7207e5ecd2fac4209c4554aeaea5e21"
This doesn't look right:
But igb1 isn't/wasn't your WAN interface?