just a thought (that might be way off), are there antispoofing rules on bridged interfaces in pfsense? There was a bug in m0n0wall quite a while back, but after pfsense forked, where antispoofing rules were being applied to bridged interfaces. they shouldn't be applied at all to any bridged interface, as it causes all kinds of issues in certain circumstances.

Tim Roberts wrote:
I did. The first line in my post was from the system log. Heres another snip:
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:46:30         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:46:30         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:46:29         BRIDGE0         172.16.248.3:67         
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:46:29         BRIDGE0         172.16.248.3:67         
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:46:29         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:46:29         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:44:32         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:44:32         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:44:31         BRIDGE0         172.16.248.3:67         
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:44:31         BRIDGE0         172.16.248.3:67         
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:44:31         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:44:31         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:40:31         BRIDGE0         172.24.15.1     216.26.248.13   
ICMP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:40:16         BRIDGE0         172.26.2.238    239.255.255.253 
        IGMP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:40:00         BRIDGE0         172.26.2.238    239.255.255.253 
        IGMP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:38:38         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
<http://172.16.248.192/diag_logs_filter.php#>

        Apr 28 18:38:38         BRIDGE0         172.16.248.106:67       
255.255.255.255:68      UDP
        :38:37  BRIDGE0         172.16.248.3:67         255.255.255.255:68      
UDP

172.16.248.106 and 172.16.248.3 are our DHCP servers. We have permited UDP 67 & 68 from any host to any host and even from any host to 255.255.255.255 just for giggles. Doesnt seem to matter which rules I plop in DHCP doesnt work. Is there something Im missing for DHCP other then UDP 67 & 68? Its WinBlowz DNS. Should I have put a 3rd NIC and bridged from LAN to OPT? Monowall used to make you do that. Just seemed silly to have 3 nics for a bridge when you only need 2. Is there a hitch bridging from LAN to WAN for this type of service? Thanks
Tim

    ----- Original Message -----
    *From:* Scott Ullrich <mailto:[EMAIL PROTECTED]>
    *To:* [email protected] <mailto:[email protected]>
    *Sent:* Friday, April 28, 2006 1:14 PM
    *Subject:* Re: [pfSense Support] HELP! Beta 3 + Bridge Not
    allowing DHCP thru

    Look in the System logs for the items being blocked and allow
    them.  I have a wireless WAN to OPT1 bridge and I am getting DHCP
    no problem on my powerbook.

    On 4/28/06, *Tim Roberts* <[EMAIL PROTECTED]
    <mailto:[EMAIL PROTECTED]>> wrote:

        We came under a multicast flood tht is cripling us. I quickly
        tossed together a PFSense Beta 3 box with 2 nics and set it up
        as a bridge. We placed it in a half way point in our wireless
        backbone. We put 2 rules on each interface (we couldnt tell
        which interface was which under frustrating circumstances in
        he dark at a tower). Both rules are to drop IGMP from any to
        any. We also added a rule to drop any source to 224.0.0.0/4
        <http://224.0.0.0/4> on both the lan and the wan.
our problem is that now our clients on the far side of the
        backbone cannot obtain addresses via DHCP. static customers
        get on and flow fine. So we inserted "allow any source to any
        destination udp 67-68". The firewall logs show drops over and
        over from our dhcp (172.16.248.3 <http://172.16.248.3>) server:
                Apr 28 16:00:18         BRIDGE0         172.16.248.3:67
        <http://172.16.248.3:67>  255.255.255.255:68
        <http://255.255.255.255:68>       UDP

here are the lan rules:
                        Proto   Source  Port    Destination     Port    Gateway 
        Description     

                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=7>
                UDP     172.16.248.3 <http://172.16.248.3>        67      
255.255.255.255
        <http://255.255.255.255>  68      *       Allow All Thru DHCP     
                [edit rule] <http://172.16.248.192/firewall_rules_edit.php?id=7>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=7>
        [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=7>


                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=8>
                *       172.24.128.128 <http://172.24.128.128>    *       
172.16.248.8
        <http://172.16.248.8>     *       *       Allow All Thru DHCP     
                [edit rule] <http://172.16.248.192/firewall_rules_edit.php?id=8>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=8>
        [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=8>


                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=9>
                UDP     *       *       *       67      *       Allow All Thru 
DHCP     
                [edit rule] <http://172.16.248.192/firewall_rules_edit.php?id=9>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=9>
        [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=9>


                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=10>
                UDP     *       *       *       68      *       Allow All Thru 
DHCP     
                [edit rule]
        <http://172.16.248.192/firewall_rules_edit.php?id=10>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=10>
                [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=10>


                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=11>
                IGMP    *       *       *       *       *       Drop IGMP       
                [edit rule]
        <http://172.16.248.192/firewall_rules_edit.php?id=11>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=11>
                [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=11>


                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=12>
                *       *       *       224.0.0.0/12 <http://224.0.0.0/12>      
  *       *       Drop IGMP       
                [edit rule]
        <http://172.16.248.192/firewall_rules_edit.php?id=12>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=12>
                [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=12>


                [click to toggle enabled/disabled status]
        <http://172.16.248.192/firewall_rules.php?if=lan&act=toggle&id=13>
                *       *       *       *       *       *       Default LAN -> 
any   
                [edit rule]
        <http://172.16.248.192/firewall_rules_edit.php?id=13>
        [delete rule]
        <http://172.16.248.192/firewall_rules.php?act=del&if=lan&id=13>
                [add a new rule based on this one]
        <http://172.16.248.192/firewall_rules_edit.php?dup=13>

wan rules are same. As you can see we have tried some pretty
        stupid stuff troublshooting. I realize the 1st rule is dumb
        but the 3rd & forth outta get'r done shouldnt?
Thanks in advance!
        Tim




---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to