Firewall rule to Drop and not log from UDP 7423?

General questions.
Post Reply
MBrown
Posts: 2
Joined: April 16th, 2019, 9:28 pm

Firewall rule to Drop and not log from UDP 7423?

Post by MBrown » April 16th, 2019, 9:37 pm

I'm a new user who has recently converted from ipcop to ipfire, so far I'm having great success with IPfire. I do have one issue though... My netgear router on the RED side likes to spam the network with UDP port 7423 requests. IPFire is picking them up but I'm unable to create a rule to drop and not log these. I can turn logging off for all Drop_Inputs but I rather not do that. Any firewall rules I try, Source Any or 10.0.0.1, to Destination 255.255.255.255 or Any on destination port UDP 7423 without logging do not appear to work, they continue to get logged in the firewall log. Has anyone been able to overcome this issue, as you can imagine it makes reviewing the firewall log very painful? If so would you share how you did it?

Examples of the firewall log entries for this are :

Time Chain Iface Proto Source Destination Src Port Dst Port Country MAC Address
00:27:08 DROP_INPUT red0 UDP 10.0.0.1 255.255.255.255 32769 7423 74:44:01:3e:b2:92
00:27:14 DROP_INPUT red0 UDP 10.0.0.1 255.255.255.255 32769 7423 74:44:01:3e:b2:92
00:27:20 DROP_INPUT red0 UDP 10.0.0.1 255.255.255.255 32769 7423 74:44:01:3e:b2:92
00:27:27 DROP_INPUT red0 UDP 10.0.0.1 255.255.255.255 32769 7423 74:44:01:3e:b2:92

Thank you for your time!

Post Reply