My simplified ruleset of interest is:
# LAN interface
Yes, I am still seeing traffic logged on pflog1 to TCP port 443:
I omitted the actual IPs. Is it being blocked or is it just logging it for some other reason? I was trying to diagnose another issue and am unsure if this is related or not.
# LAN interface
Code:
pass out quick on wan proto {tcp udp} to port {http https} flags S/SA keep state queue normal
pass in quick on wired proto {tcp udp} from \
{$zone_nintendo} \
to port {http https} flags S/SA keep state
block log (to pflog1) quick on LAN
Yes, I am still seeing traffic logged on pflog1 to TCP port 443:
Code:
21:20:49.132741 IP (tos 0x0, ttl 64, id 64177, offset 0, flags [DF], proto TCP (6), length 52)
{LAN_IP}.51000 > {SOME_AMAZON_AWS_SERVER}.443: Flags [R.], cksum 0xd878 (correct), seq 1348, ack 1, win 1032, options [nop,nop,TS val 176667222 ecr 2376698083], length 0
I omitted the actual IPs. Is it being blocked or is it just logging it for some other reason? I was trying to diagnose another issue and am unsure if this is related or not.