Bug #13992
closedCustom default state timeouts are not respected in the ruleset
100%
Description
When I change the timeouts:
UDP Single to 60
UDP Multiple to 300
And then check from the command line with pfctl -s timeouts
it still shows them at the defaults.
udp.single 30s
udp.multiple 60s
Even after a reboot they are not applied.
First noticed after upgrading to 23.01 that all my Sip phones starting dropping in and out.
Updated by Steve Wheeler almost 2 years ago
The expected values do not get added to the rules.debug file so are not applied to pf.
set timeout { udp.single 60 udp.multiple 300 }
Updated by Steve Wheeler almost 2 years ago
Setting timeouts via the Firewall Optimiazation Options field is still created and applied as expected in 23.01-REL.
set optimization conservative set timeout { udp.first 300, udp.single 150, udp.multiple 900 }
Updated by Marcos M almost 2 years ago
- Project changed from pfSense Plus to pfSense
- Subject changed from State timeouts in the gui under system/advanced/firewall&nat or not being set in pf. to Custom state timeouts are not saved
- Category changed from Web Interface to Web Interface
- Target version set to 2.7.0
- Affected Plus Version deleted (
23.01) - Plus Target Version set to 23.05
- Affected Version set to 2.7.0
- Affected Architecture deleted (
amd64)
Updated by Jim Pingle almost 2 years ago
- Status changed from New to Feedback
- % Done changed from 0 to 100
Applied in changeset d015b45a395045a56b9190f284459a6a4cc57568.
Updated by aleksei prokofiev almost 2 years ago
Applied provided patch and nothing changes. After reboot all works good and timeouts are saves.
So, reboot required after apply patch.
Updated by Jim Pingle almost 2 years ago
aleksei prokofiev wrote in #note-5:
Applied provided patch and nothing changes. After reboot all works good and timeouts are saves.
So, reboot required after apply patch.
You don't need to reboot, you just need to go to Status > Filter Reload and click Reload Filter. Or you can click Save on System > Advanced, Firewall & NAT Tab.
Updated by Jim Pingle almost 2 years ago
- Subject changed from Custom state timeouts are not saved to Custom default state timeouts are not respected in the ruleset
- Category changed from Web Interface to Rules / NAT
Updated by Anonymous almost 2 years ago
Applied the patch and it's working fine here even without a reboot.
Updated by Danilo Zrenjanin over 1 year ago
- Status changed from Feedback to Resolved
The patch fixes the issue. I've just run the Status > Filter Reload after applying the patch.
I am marking this ticket resolved.