50IOT 2023-06-06T12:55:41-07:00 0.0.0.0:68 255.255.255.255:67 udp Block bogon IPv4 networks from 50IOT 50IOT 2023-06-06T12:55:40-07:00 0.0.0.0:68 255.255.255.255:67 udp Block bogon IPv4 networks from 50IOT
block in quick proto tcp from {<sshlockout>} to {(self)} port {22} label "a13bd48dc2f2885e10a66983a2b4d19d" # sshlockoutblock in quick proto tcp from {<sshlockout>} to {(self)} port {443} label "fc2d22120a5d07f6ffc1df176ba5fdd8" # sshlockoutblock in quick from {<virusprot>} to {any} label "74301983dfeb857eca47f255983e768a" # virusprot overload tablepass in quick on ix0 proto udp from {fe80::/10} port {546} to {fe80::/10} port {546} label "8cd6199018ef9eb8a56a803f76d043ba" # allow dhcpv6 client in 0WANpass in quick on ix0 proto udp from {any} port {547} to {any} port {546} label "223a20aafe5da09a3dd93ec49dd4a20b" # allow dhcpv6 client in 0WANpass out quick on ix0 proto udp from {any} port {546} to {any} port {547} label "a9b9f166e202739c50d110f23a967b30" # allow dhcpv6 client in 0WANpass in quick on ix0 proto udp from {any} port {67} to {any} port {68} label "11e1835f5f8e7ae3832c087ccb3ed724" # allow DHCP client on 0WANpass out quick on ix0 proto udp from {any} port {68} to {any} port {67} label "5751b57c4f1822948ab5a9f3e22bd8ad" # allow DHCP client on 0WANpass in quick on em0 inet6 proto udp from {fe80::/10} to {fe80::/10,ff02::/16} port {546} label "e8739697dc6c79ab7fd306255d59389a" # allow access to DHCPv6 server on 10LANpass in quick on em0 inet6 proto udp from {fe80::/10} to {ff02::/16} port {547} label "5c917d580d40669defaf32fc03bfa6a8" # allow access to DHCPv6 server on 10LANpass in quick on em0 inet6 proto udp from {ff02::/16} to {fe80::/10} port {547} label "255d1ec72e46d222388fc2200373cdc6" # allow access to DHCPv6 server on 10LANpass in quick on em0 inet6 proto udp from {fe80::/10} to {(self)} port {546} label "ace4bc578b264bf701f9fa342defb098" # allow access to DHCPv6 server on 10LANpass out quick on em0 inet6 proto udp from {(self)} port {547} to {fe80::/10} label "9327f8564428628b4ab621fed67850dc" # allow access to DHCPv6 server on 10LANpass in quick on vlan01 inet6 proto udp from {fe80::/10} to {fe80::/10,ff02::/16} port {546} label "2fb22015862be95d6539658e0916bc5f" # allow access to DHCPv6 server on 20WKSpass in quick on vlan01 inet6 proto udp from {fe80::/10} to {ff02::/16} port {547} label "f9a56755581d6f7d390147c00c140efb" # allow access to DHCPv6 server on 20WKSpass in quick on vlan01 inet6 proto udp from {ff02::/16} to {fe80::/10} port {547} label "6b90c7032193d3e57463a2347ac3ff8f" # allow access to DHCPv6 server on 20WKSpass in quick on vlan01 inet6 proto udp from {fe80::/10} to {(self)} port {546} label "3842aa87d5e954a3b458e62f5c67bfeb" # allow access to DHCPv6 server on 20WKSpass out quick on vlan01 inet6 proto udp from {(self)} port {547} to {fe80::/10} label "f467dcffa5e62a1556860f203c13ef28" # allow access to DHCPv6 server on 20WKS
# [prio: 5]block in log quick on ix0 inet from {<bogons>} to {any} label "9feb1ff22602ce7fa249ca38a748a8d6" # Block bogon IPv4 networks from 0WANblock in log quick on ix0 inet6 from {<bogonsv6>} to {any} label "730b04035be750d29de5c32523480cf5" # Block bogon IPv6 networks from 0WANblock in log quick on ix0 inet from {10.0.0.0/8,127.0.0.0/8,100.64.0.0/10,172.16.0.0/12,192.168.0.0/16} to {any} label "ef5f5d3adad0ef34d40d4a7e2bcf7555" # Block private networks from 0WANblock in log quick on ix0 inet6 from {fc00::/7} to {any} label "bf7cbeeb098c49140d6b541473452bef" # Block private networks from 0WAN# block in log quick on em0 inet from {<bogons>} to {any} label "bd499fb1bef5e57ad46cef500e94f021" # Block bogon IPv4 networks from 10LAN# block in log quick on em0 inet6 from {<bogonsv6>} to {any} label "d37827d6f035d3698f37dd6aabb75137" # Block bogon IPv6 networks from 10LAN# block in log quick on em0 inet from {10.0.0.0/8,127.0.0.0/8,100.64.0.0/10,172.16.0.0/12,192.168.0.0/16} to {any} label "79727f2e242690dfb030f966ae503cca" # Block private networks from 10LAN# block in log quick on em0 inet6 from {fc00::/7} to {any} label "0852c8b1d565cbd23ec0572d6604c756" # Block private networks from 10LAN# block in log quick on vlan01 inet from {<bogons>} to {any} label "d9ef560ede9c083edc377939b63fafa5" # Block bogon IPv4 networks from 20WKS# block in log quick on vlan01 inet6 from {<bogonsv6>} to {any} label "9d511ebb2fa6e6833371d6da3ad5c1c7" # Block bogon IPv6 networks from 20WKS# block in log quick on vlan01 inet from {10.0.0.0/8,127.0.0.0/8,100.64.0.0/10,172.16.0.0/12,192.168.0.0/16} to {any} label "a2908bb216855e9bd0984811c8cb5c4e" # Block private networks from 20WKS# block in log quick on vlan01 inet6 from {fc00::/7} to {any} label "aadbaed51857e9273da06101321d119e" # Block private networks from 20WKS
# block in log quick on ix1 inet from {10.0.0.0/8,127.0.0.0/8,100.64.0.0/10,172.16.0.0/12,192.168.0.0/16} to {any} label "1dcbcdddb381d47a0c2269720b841b81" # Block private networks from OPT1# block in log quick on ix1 inet6 from {fc00::/7} to {any} label "4478089a2788fb64acf553b5efb6131b" # Block private networks from OPT1# block in log quick on openvpn inet from {<bogons>} to {any} label "5b27aa5e5d332d9e350ac2b095eb0104" # Block bogon IPv4 networks from OpenVPN# block in log quick on openvpn inet6 from {<bogonsv6>} to {any} label "ea177ebe00d466ee5c232dab70749518" # Block bogon IPv6 networks from OpenVPN# block in log quick on openvpn inet from {10.0.0.0/8,127.0.0.0/8,100.64.0.0/10,172.16.0.0/12,192.168.0.0/16} to {any} label "3a9b23e39e6df8b8359d9e47fe8daec1" # Block private networks from OpenVPN# block in log quick on openvpn inet6 from {fc00::/7} to {any} label "4d468be62333d1d91b2413697bbce660" # Block private networks from OpenVPNpass in quick on em0 proto udp from {any} port {68} to {255.255.255.255} port {67} label "90054c3d7cca21cfec8ee12c1b0c74d1" # allow access to DHCP serverpass in quick on em0 proto udp from {any} port {68} to {(self)} port {67} label "5fcc539c669a0e0a476e19bcde5b03fd" # allow access to DHCP serverpass out quick on em0 proto udp from {(self)} port {67} to {any} port {68} label "cfe897788580cd054702c483bb47890f" # allow access to DHCP serverpass in quick on vlan01 proto udp from {any} port {68} to {255.255.255.255} port {67} label "fdd28dc9305e362e4512c0f1e1715746" # allow access to DHCP serverpass in quick on vlan01 proto udp from {any} port {68} to {(self)} port {67} label "4917b3d5427938f2b292c527ad5b6dfa" # allow access to DHCP serverpass out quick on vlan01 proto udp from {(self)} port {67} to {any} port {68} label "f8f4a8819bd03fde293b00c80319644e" # allow access to DHCP serverpass in quick on vlan02 proto udp from {any} port {68} to {255.255.255.255} port {67} label "7a4bc76014310d96b161abe7b1672f4c" # allow access to DHCP serverpass in quick on vlan02 proto udp from {any} port {68} to {(self)} port {67} label "c843c49db83786e6e5a7f7a404a42b96" # allow access to DHCP serverpass out quick on vlan02 proto udp from {(self)} port {67} to {any} port {68} label "e1d80d9bcab29cae8a1a7c5081e89887" # allow access to DHCP server
Ok we talk about blocking bogons on LAN interfaces... I'm not sure, how many people are using it? Does it make sense? I think we never had that in our defaults.Cheers,Franco
Quote from: franco on June 07, 2023, 05:26:51 pmOk we talk about blocking bogons on LAN interfaces... I'm not sure, how many people are using it? Does it make sense? I think we never had that in our defaults.Cheers,Franco...and most likely never will, for good reasons?
Automatically generated necessary allow rules should go first regardless of the interface.@IsaacFL would you please open an issue on Github?