Tim,
One more shot at this before I give up...
I created a sample rule using the GUI. Does your rule look like this one?
~Ed
On 2/23/2015 11:48 AM, Tim Hogan wrote:
Ed,
I have version 2.1.46.30093 installed on my NAS which is newer than
the link below. I have also discovered burred under the noise being
created by the NAS that I have one other device also generating the
same type of traffic, just not as often. This other device was my
Samsung Tablet and I found that if I turned off the media discovery
service on the table that the traffic stopped. I have disabled media
sharing on the NAS but the traffic is still being generated.
My point here is not to fix broken implementations that various
vendors put in place but instead my feeling that I should be able to
have some control over the "built-in" rules and prevent logging if I
so desire.
Regards,
Tim
On 2/23/2015 8:40 AM, Edward Servello wrote:
Hi again Tim,
Does your NAS device have the most recent firmware applied. I found
this article with a link to firmware on the Lenovo site.
https://lenovo-na-en.custhelp.com/app/answers/detail/a_id/24661/kw/2.1.38.22294/related/1
~Ed
On Mon, Feb 23, 2015 at 8:56 AM, Tim Hogan <[email protected]
<mailto:[email protected]>> wrote:
Ed,
I agree that it would be nice to be able to stop this at the
source however, the source is an iOmega ix-200d appliance. I have
manually set the IP address in the GUI but who knows how iOmega
has built this thing. I have noticed that this traffic does not
start right after a reboot. It takes a couple of minutes which
makes me think that there is some process that starts up that is
generating this traffic. But without control at the OS layer I do
not know how to stop it. So my option it to try and quite the
noise.
Regards,
Tim
On 2/22/2015 11:20 AM, Edward Servello wrote:
Hello Tim,
The problem appears in pfSense Issue 2073
<https://redmine.pfsense.org/issues/2073>.
The APIPA address (autoIP 169.254) is not valid on the
interface that's logging the error. That may be blocked and
logged by pfSense before the user-defined rules are applied.
Could the NAS be using the APIPA addresses because it's not
getting a response from DHCP? Did you try assigning a fixed,
valid address on the NAS to stop it from falling back to
169.254? It might be better overall to address the root cause
rather than stopping the logging.
~Ed
On 2/22/2015 9:25 AM, Tim Hogan wrote:
Hello All,
I am using pfSense v2.2 and I have been seeing a bunch of
firewall log entries blocking traffic to the
169.254.0.0/16 <http://169.254.0.0/16> netblock. This
traffic seems to be created by an older NAS that I have
and I really do not want these message in my logs. So, my
thought was that I would create a rule on my LAN to block
that traffic and I would just make sure that the "log
traffic" option was unchecked. That did not work. When I
look at the log entry I see the following message.
The rule that triggered this action is:
@8(1000000102) block drop in log quick inet from any to
169.254.0.0/16 <http://169.254.0.0/16> label "Block IPv4
link-local"
Where on earth is that rule so I can remove the log
option? Or is there a setting that I missed somewhere?
Thanks,
Tim
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold