? (192.168.1.82) at 08:cc:68:xx:xx:xx on bridge0 expires in 1176 seconds [bridge]?
192.168.1.82 08-cc-68-xx-xx-xx dynamic
21:53:27.743148 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 12037, seq 0, length 6421:53:27.746797 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5021:53:28.746825 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5021:53:28.747657 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 12037, seq 1, length 64
tcpdump -i bridge0 host 192.168.1.2
22:40:37.036722 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34087, seq 0, length 6422:40:37.044966 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5022:40:37.044971 ARP, Reply OPNsense.localdomain is-at 02:b2:2d:xx:xx:xx (oui Unknown), length 3222:40:37.142473 ARP, Reply OPNsense.localdomain is-at 02:b2:2d:xx:xx:xx (oui Unknown), length 2822:40:38.037821 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34087, seq 1, length 6422:40:38.045163 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5022:40:38.045172 ARP, Reply OPNsense.localdomain is-at 02:b2:2d:xx:xx:xx (oui Unknown), length 3222:40:39.045122 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5022:40:39.045131 ARP, Reply OPNsense.localdomain is-at 02:b2:2d:xx:xx:xx (oui Unknown), length 3222:40:39.045189 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34087, seq 2, length 6422:40:39.804002 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 13867, seq 0, length 6422:40:40.857483 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 13867, seq 1, length 6422:40:40.865206 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5022:40:40.865214 ARP, Reply OPNsense.localdomain is-at 02:b2:2d:xx:xx:xx (oui Unknown), length 3222:40:41.865232 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5022:40:41.865241 ARP, Reply OPNsense.localdomain is-at 02:b2:2d:xx:xx:xx (oui Unknown), length 32
09:12:06.119746 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34144, seq 281, length 6409:12:06.119801 IP OPNsense.localdomain.ssh > 192.168.1.195.10973: Flags [P.], seq 10293:10329, ack 108, win 513, length 3609:12:06.120132 IP 192.168.1.195.10973 > OPNsense.localdomain.ssh: Flags [.], ack 10329, win 63144, length 009:12:06.123524 ARP, Request who-has OPNsense.localdomain tell 192.168.1.82, length 5009:12:06.123533 ARP, Reply OPNsense.localdomain is-at 02:e4:c2:xx:xx:xx (oui Unknown), length 3209:12:06.130492 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34144, seq 282, length 6409:12:06.130584 IP OPNsense.localdomain.ssh > 192.168.1.195.10973: Flags [P.], seq 10329:10365, ack 108, win 513, length 3609:12:06.141206 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34144, seq 283, length 6409:12:06.141299 IP OPNsense.localdomain.ssh > 192.168.1.195.10973: Flags [P.], seq 10365:10401, ack 108, win 513, length 3609:12:06.141644 IP 192.168.1.195.10973 > OPNsense.localdomain.ssh: Flags [.], ack 10401, win 63072, length 009:12:06.151922 IP OPNsense.localdomain > 192.168.1.82: ICMP echo request, id 34144, seq 284, length 6409:12:06.152016 IP OPNsense.localdomain.ssh > 192.168.1.195.10973: Flags [P.], seq 10401:10437, ack 108, win 513, length 36
root@OPNsense:~ # pfctl -sr | grep -i 192block drop in log on ! bridge0 inet from 192.168.1.0/24 to anyblock drop in log inet from 192.168.1.2 to anyblock drop in log quick on pppoe0 inet from 192.168.0.0/16 to any label "Block private networks from 3WANC"block drop in log quick on igb3 inet from 192.168.0.0/16 to any label "Block private networks from 3WANCS"block drop in log quick on igb1 inet from 192.168.0.0/16 to any label "Block private networks from 4WANH"pass in quick on bridge0 inet from 192.168.1.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule"