lan Dec 22 07:20:27 10.0.0.33:60061 153.122.0.27:80 tcp USER_RULE: Block SILENT HTTPS any NOT LAN or VPNs lan Dec 22 07:20:19 10.0.0.33:60061 153.122.0.27:80 tcp USER_RULE: Block SILENT HTTPS any NOT LAN or VPNs lan Dec 22 07:20:15 10.0.0.33:60061 153.122.0.27:80 tcp USER_RULE: Block SILENT HTTPS any NOT LAN or VPNs lan Dec 22 07:20:13 10.0.0.33:60061 153.122.0.27:80 tcp USER_RULE: Block SILENT HTTPS any NOT LAN or VPNs lan Dec 22 07:20:12 10.0.0.33:60061 153.122.0.27:80 tcp USER_RULE: Block SILENT HTTPS any NOT LAN or VPNs
__timestamp__ Jan 3 22:50:49ack 331199351action [block]anchorname datalen 63dir [in]dst 89.132.120.129dstport 36686ecn id 47036interface igb1ipflags nonelabel pass loopbacklength 115offset 0proto 6protoname tcpreason matchridentifier 0rulenr 104seq 1919712663:1919712726src 172.217.18.78srcport 443subrulenr tcpflags FPAtcpopts tos 0x0ttl 122urp 435version 4
Jan 3 22:50:49 filterlog: 104,,,0,igb1,match,block,in,4,0x0,,122,47036,0,none,6,tcp,115,172.217.18.78,89.132.120.129,443,36686,63,FPA,1919712663:1919712726,331199351,435,,nop;nop;TS
WAN Jan 3 23:25:57 89.132.120.129:1222 1.1.1.1:53 udp Block bogon IPv4 networks from WAN WLAN Jan 3 23:25:57 10.1.3.104:53513 10.1.3.1:53 udp USER_RULE: lan:2internetTcp LANT Jan 3 23:25:53 10.1.1.50:50386 10.1.1.1:443 tcp USER_RULE: guestif:Allow UDP to Inet LANT Jan 3 23:25:53 10.1.1.50:50384 10.1.1.1:443 tcp USER_RULE: guestif:Allow UDP to Inet LANT Jan 3 23:25:53 10.1.1.50:50382 10.1.1.1:443 tcp USER_RULE: guestif:Allow UDP to Inet LANT Jan 3 23:25:53 10.1.1.50:50380 10.1.1.1:443 tcp USER_RULE: guestif:Allow UDP to Inet lo0 Jan 3 23:25:52 127.0.0.1:59071 127.0.0.1:2055 udp webConfiguratorlockout lo0 Jan 3 23:25:52 127.0.0.1:59071 127.0.0.1:2055 udp virusprot overload table
pfctl -vvPnf /tmp/rules.debug
pfctl -f /tmp/rules.debug
File /var/log/system.log yielded no results.
Jan 5 14:36:56 flowd_aggregate.py: vacuum doneJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/interface_086400.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/interface_003600.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/interface_000300.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/interface_000030.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/dst_port_086400.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/dst_port_003600.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/dst_port_000300.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/src_addr_086400.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/src_addr_003600.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/src_addr_000300.sqliteJan 5 14:36:56 flowd_aggregate.py: vacuum /var/netflow/src_addr_details_086400.sqlite
This can happen after a reload of the firewall, since the log output only has a line number in it of the raw ruleset in /tmp/rules.debug (which might have changed in the meantime)The log rule has a field "rulenr", which represents the line in Code: [Select]pfctl -vvPnf /tmp/rules.debug There's not much we can do about that at the moment unfortunately.