I created a packet filtering rule:
source: any
dest: any
service: Windows Network (NETBIOS)
action: reject with "no log".
But I still see the udp port 137 being dropped in the log, as part of the default rules, not the rule # that I defined.
In below example from the log, 192.168.10.100/24 is one internal host, and 123.123.123.123 is the WAN IP, eth2 is internal interface with mac address 00:1a:8c:f0:a6:62.
BTW, internal network has a few subnet, and the eth2 is connected to subnet 192.168.1.0/24.
2009:04:14-00:00:14 fw1n1-1 ulogd[12211]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" seq="0" initf="eth2" outitf="eth2" dstmac="00:1a:8c:f0:a6:62" srcmac="00:00:00:00:00:00" srcip="192.168.10.100" dstip="123.123.123.123" proto="17" length="78" tos="0x00" prec="0x00" ttl="127" srcport="57065" dstport="137"
Any thoughts?
This thread was automatically locked due to age.