Rules

Overview

OPNsense contains a stateful packet filter, which can be used to restrict or allow traffic from and/or to specific networks as well as influence how traffic should be forwarded (see also policy based routing in “Multi WAN”).

The rules section shows all policies that apply on your network, grouped by interface.

There are two implementations to choose from:

  • Rules [new]: a modern MVC implementation with API support and improved rule management

  • Rules: a static PHP page with no API support

Tip

Rules [new] will replace Rules over time, you can already migrate your existing rules with a helper in Firewall ‣ Rules ‣ Migration assistant.

The basics

Before creating rules, it’s good to know about some basics which apply to all rules.

States

By default rules are set to stateful (you can change this, but it has consequences), which means that the state of a connection is saved into a local dictionary which will be resolved when the next packet comes in. The consequence of this is that when a state exists, the firewall doesn’t need to process all its rules again to determine the action to apply, which has huge performance advantages.

Another advantage of stateful packet filtering is that you only need to allow traffic in one direction to automatically allow related packets for the same flow back in. Below diagram shows a tcp connection from a client to a server for https traffic, when not using stateful rules, both the client should be permitted to send traffic to the server at port 443 as the server back to the client (usually a port >=1024).

The use of states can also improve security particularly in case of tcp type traffic, since packet sequence numbers and timestamps are also checked in order to pass traffic, it’s much harder to spoof traffic.

Note

When changing rules, sometimes its necessary to reset states to assure the new policies are used for existing traffic. You can do this in Firewall ‣ Diagnostics ‣ States.

Note

In order to keep states, the system need to reserve memory. By default 10% of the system memory is reserved for states, this can be configured in Firewall ‣ Settings ‣ Firewall Maximum States. (The help text shows the default number of states on your platform)

States can also be quite convenient to find the active top users on your firewall at any time, we added an easy to use “session” browser for this purpose. You can find it under Firewall ‣ Diagnostics ‣ Sessions.

Tip

States also play an important rule into protecting services against (distributed) denial of service attacks (DDOS). Relevant topics available in our documentation are “synproxy” states, connection limits and syncookies

Action

Rules can be set to three different action types:

  • Pass –> allow traffic

  • Block –> deny traffic and don’t let the client know it has been dropped (which is usually advisable for untrusted networks)

  • Reject –> deny traffic and let the client know about it. (only tcp and udp support rejecting packets, which in case of TCP means a RST is returned, for UDP ICMP UNREACHABLE is returned).

For internal networks it can be practical to use reject, so the client does not have to wait for a time-out when access is not allowed. When receiving packets from untrusted networks, you usually don’t want to communicate back if traffic is not allowed.

Processing order

Firewall rules are processed in sequence per section, first evaluating the Floating rules section followed by all rules which belong to interface groups and finally all interface rules.

Internal (automatic) rules are usually registered first.

Rules can either be set to quick or not set to quick, the default is to use quick. When set to quick, the rule is handled on “first match” basis, which means that the first rule matching the packet will take precedence over rules following in sequence.

When quick is not set, last match wins. This can be useful for rules which define standard behaviour. Our default deny rule uses this property for example (if no rule applies, drop traffic).

Note

Internally rules are registered using a priority, floating uses 200000, groups use 300000 and interface rules land on 400000 combined with the order in which they appear. Automatic rules are usually registered at a higher priority (lower number).

Warning

NAT rules are always processed before filter rules! So for example, if you define a NAT : Destination NAT (Port Forwarding) rules without a associated rule, i.e. Filter rule association set to Pass, this has the consequence, that no other rules will apply!

Tip

The interface should show all rules that are used, when in doubt, you can always inspect the raw output of the ruleset in /tmp/rules.debug

Since Firewall ‣ Rules [new] and Firewall ‣ Rules implementations exist side by side, there are some additional considerations regarding the processing order of rules.

If a Firewall ‣ Rules [new] filter rule has:

  • a single interface defined, it is an Interface Rule

  • a group interface defined, it is a Group Rule

  • any number of interfaces or one inverted interface defined, it is a Floating Rule

Processing order:

  1. System defined rules at the beginning of the ruleset

  2. Firewall ‣ Rules [new] and Firewall ‣ Rules floating rules

  3. Firewall ‣ Rules [new] and Firewall ‣ Rules group rules

  4. Firewall ‣ Rules [new] single interface rules

  5. Firewall ‣ Rules single interface rules

  6. System defined rules at the end of the ruleset

Rule sequence

The sequence in which the rules are displayed and processed can be customized per section:

  • Select one or more rules using the checkbox on the left side of the rule.

  • Use the arrow button in the action menu on the right side of a rule in order to move selected rules before the rule where the action button is pressed.

  • Or you can use the arrow button on the top in the heading row to move the selected rules to the end.

Tip

In Firewall ‣ Rules [new], you can reveal a sequence number by toggling the advanced mode. This number influences the processing order of rules in the same priority group (displayed as Sort order). When using the arrow buttons to move rules, the sequence number is changed.

Direction

Traffic can be matched on in[coming] or out[going] direction, our default is to filter on incoming direction. In which case you would set the policy on the interface where the traffic originates from.

For example, if you want to allow https traffic coming from any host on the internet, you would usually set a policy on the WAN interface allowing port 443 to the host in question.

Note

Traffic leaving the firewall is accepted by default (using a non-quick rule), when Disable force gateway in Firewall ‣ Settings ‣ Advanced is not checked, the connected gateway would be enforced as well.

Implementations

Rules [new]

Rules [new] started out as Firewall Automation with a limited GUI to offer API support, since the static php implementation of Rules lacked automation requirements. Over time, more features have been added, and the GUI has been completely reworked. Long requested features like advanced search functionality, category folders improved performance and better visibility are the result.

You can find it in Firewall ‣ Rules [new] or Firewall ‣ Automation ‣ Filter.

User Interface

Our overview shows all the rules that apply to the selected interface, group or floating section. For every rule, some details are provided and when applicable you can perform actions such as move, edit, copy, delete.

API access is described in more detail in the firewall API reference manual.

../_images/firewall_rules_1.png
Interface filter

Choose an interface to filter the current view. Floating, group and single interfaces can be selected.

If you choose the “LAN” interface, you will be presented with all floating, group and single interface rules that influence packet decisions of the LAN interface.

If you create a new rule while having an interface selected, it will be automatically added to dialog.

Categories filter

Choose one or multiple categories to filter the current view. This combines with the selection of the interface filter.

Categories can be created in Firewall ‣ Categories and can enable grouping different logic constructs.

If you create a category for mailservers and tag rules with it, you can simply filter for this tag and only see your mailservers. As with the interface filter, selecting one or multiple tags will add them automatically to a new rule.

Tree button

Group all firewall rules in a tree, based on their category. The groups act like folders, but always honor the sort order and sequence. The group folders are not saved inside the configuration, they are an alternative view based on categories.

Whenever a rule in sequence changes category, a new folder copying the category of the first rule will be created. To move similiar rules into the same folder, change their sequence and category. But keep in mind that the sequence of rules will always be the same as without the tree view.

Inspect button

The inspect button will reveal all system defined (automatic) firewall rules and show rule statistics. It can be enabled at any time to get a complete view of the current active ruleset.

While in inspect mode the search can find IP addresses inside aliases.

Rule statistics are cached. To pull the latest statistics, press the refresh button in the statistics column.

Settings

Option

Description

Enabled

Enable this rule

Sort order

The order in which rules are being processed.

Sequence

The order in which rules are being processed. Please note that this is not a unique identifier, the system will automatically recalculate the ruleset when rule positions are changed with the available “Move rule before this rule” button.

Categories

For grouping purposes you may select multiple groups here to organize items.

No XMLRPC Sync

Exclude this item from the HA synchronization process. An already existing item with the same UUID on the synchronization target will not be altered or deleted as long as this is active.

Description

You may enter a description here for your reference (not parsed).

Divert-to

With divert we can integrate additional policy constructs into firewall rules. A rule with “divert-to” can send all packets to a divert socket, on which a service like Intrusion Prevention System can listen.

This can provide more fine grained control than intercepting all traffic for inspection. It can improve performance because large flows that do not necessarily need inspection can be excluded.

As an example, go to Services ‣ Intrusion Detection ‣ Administration and set the “Capture mode” to “Divert (IPS)”.

Afterwards, create a firewall rule that matches the traffic that should be inspected and set the “Divert-to” settings in that rule. Matching packets will be diverted to the socket the intrusion detection listens on. After making a decision, the packet will then be forwarded or dropped.

Attention

Keep in mind that when the service that listens on the divert socket is stopped, the firewall rule will drop all matching packets.

Rules

Rules is the implementation that has been around since day one. Since it consists of static php pages, there is no API support, Over time, it will be replaced by Rules [new] and a Migration assistant can be found in Firewall ‣ Rules ‣ Migration assistant.

User Interface

Our overview shows all the rules that apply to the selected interface (group) or floating section. For every rule some details are provided and when applicable you can perform actions, such as move, edit, copy, delete.

../_images/Firewall_overview.png

Below you will find some highlights about this screen.

  1. Interface name

    The name of the interface is part of the normal menu breadcrumb

  2. Category

    If categories are used in the rules, you can select which one you will show here.

  3. Toggle inspection

    You can toggle between inspection and rule view here, when in inspection mode, statistics of the rule are shown. (such as packet counters, number of active states, …)

  4. Show / hide automatic rules

    Some rules are automatically generated, you can toggle here to show the details. If a magnifying glass is shown you can also browse to its origin (The setting controlling this rule).

  5. Automatic rules

    The contents of the automatic rules

  6. User rules

    All user defined rules

Settings

Traffic that is flowing through your firewall can be allowed or denied using rules, which define policies. This section of the documentation describe the different settings, grouped by usage.

Some settings help to identify rules, without influencing traffic flow.

Category

The category this rule belongs to, can be used as a filter in the overview

Description

Descriptive text

Troubleshooting

While building your ruleset things can go wrong, it’s always good to know where to look for signs of an issue. One of the most common mistakes is traffic doesn’t match the rule and/or the order of the rule doesn’t make sense for whatever reason.

With the use of the “inspect” button, one can easily see if a rule is being evaluated and traffic did pass using this rule. It’s also possible to jump directly into the attached states to see if your host is in the list as expected.

Another valuable tool is the live log viewer, in order to use it, make sure to provide your rule with an easy to read description and enable the “log” option.

If your using source routing (policy based routing), debugging can sometimes get a bit more complicated. Since the normal system routing table may not apply, it helps to know which flow the traffic actually followed. The packet capture is a useful tool in that case.

Common issues in this area include return traffic using a different interface than the one it came into, since traffic follows the normal routing table on it’s way out (reply-to issue), or traffic leaving the wrong interface due to overselection (matching internal traffic and forcing a gateway).

Inspecting used netmasks is also a good idea, intending to match a host but providing a subnet is a mistake easily made (e.g. 192.168.1.1/32 vs 192.168.1.1/24 is in reality all of 192.168.1.x).

Last but not least, remember rules are matched in order and the default (inbound) policy is block if nothing else is specified, since we match traffic on inbound, make sure to add rules where traffic originates from (e.g. lan for traffic leaving your network, the return should normally be allowed by state).