Now Host B can ping Host A. But to my understanding, the ICMP reply of Host A should not reach back to Host B.
Quote from: Mindflayer on November 26, 2024, 10:35:18 amNow Host B can ping Host A. But to my understanding, the ICMP reply of Host A should not reach back to Host B.pf and consequently OPNsense is a stateful firewall. It operates on "connections" or "flows", not individual packets.So if an ICMP echo request in one direction is allowed, then automatically the matching reply is allowed, too, because anything else would not make much sense.The very first generation of packet filters in the nineties did not track connections. So for e.g. TCP you had to unconditionally permit every packet in with the ACK flags set. In Cisco IOS that was done by the "established" keyword in access-list statements. For UDP the gaps you had to open were even wider.Today once a client "iniside" your firewall sends a TCP SYN packet to e.g. a web server on the Internet, and that is permitted by the rules, OPNsense sets up a state for the complete TCP connection in both directions. Once the final FIN packet passes the firewall the state is deleted again. In case the connection is never correctly torn down, a timeout is applied.Hope that clears it up a bit,Patrick