Netgate is offering COVID-19 aid for pfSense software users, learn more.
Bridging and firewalling¶
Filtering with bridged interfaces functions similar to routed interfaces, but there are some configuration choices to alter exactly how the filtering behaves. By default, firewall rules are applied on each member interface of the bridge on an inbound basis, like any other routed interface.
It is possible to decide whether the filtering happens on the bridge member
interfaces, or on the bridge interface itself. This is controlled by two values
on System > Advanced on the System Tunables tab, as seen in Figure
Bridge Filtering Tunables. The net.link.bridge.pfil_member tunable
controls whether or not the rules will be honored on the bridge member
interfaces. By default, this is on (
1). The net.link.bridge.pfil_bridge
tunable controls whether or not the rules will be honored on the bridge
interface itself. By default, this is off (
0). At least one of these must be
When filtering on the bridge interface itself, traffic will hit the rules as it enters from any member interface. The rules are still considered “inbound” like any other interface rules, but they work more like an interface group since the same rules apply to each member interface.
Firewall Rule Macros¶
Only one interface of a bridge will have an IP address set, the others will have none. For these interfaces, their firewall macros such as OPT1 address and OPT1 net are undefined because the interface has no address and thus no subnet.
If filtering is performed on bridge members, keep this fact in mind when crafting rules and explicitly list the subnet or use the macros for the interface where the IP address resides.