Firewalla Gold normal logs?
Hello,
I have a Firewalla Gold in use for about a week and I am very happy.
The first few days I pinged the google DNS 8.8.8.8 and the Firewalla device itself (using PingPlotter, MacBook Pro connected via a Unifi Switch).
The ping to the Firewalla device had 0% packet loss. The ping to the google DNS had a very low packet loss ~0.1-2%/h. I don't know if this was the case before, but I couldn't remember having such behavior before.
However, this is of course also a very small packet loss, which is not completely unusual from my point of view. Nevertheless, I looked at the log files of the Firewalla.
These logs occur very frequently. Is this a normal behavior?
syslog
Feb 18 18:20:03 firewalla systemd[1]: Stopping FireRouter DNS...
Feb 18 18:20:03 firewalla systemd[1]: Stopped FireRouter DNS.
Feb 18 18:20:03 firewalla systemd[1]: Started FireRouter DNS.
Feb 18 18:20:03 firewalla bash[24812]: 1958
Feb 18 18:20:09 firewalla systemd[1]: Stopping BroFish...
Feb 18 18:20:09 firewalla systemd[1]: Stopped BroFish.
Feb 18 18:20:09 firewalla systemd[1]: Starting BroFish...
Feb 18 18:20:09 firewalla root: FIREWALLA.BROFISH Start
Feb 18 18:20:14 firewalla kernel: [110716.652516] device br2 left promiscuous mode
Feb 18 18:20:14 firewalla kernel: [110716.848204] device br2 entered promiscuous mode
Feb 18 18:20:20 firewalla systemd[1]: Stopping FireRouter DNS...
Feb 18 18:20:20 firewalla systemd[1]: Stopped FireRouter DNS.
Feb 18 18:20:20 firewalla systemd[1]: Stopping FireRouter DHCP...
Feb 18 18:20:20 firewalla systemd[1]: Stopped FireRouter DHCP.
Feb 18 18:20:20 firewalla systemd[1]: Started FireRouter DNS.
Feb 18 18:20:20 firewalla bash[26832]: 1959
Feb 18 18:20:20 firewalla systemd[1]: Started FireRouter DHCP.
Feb 18 18:20:20 firewalla bash[26858]: 1032
Feb 18 18:20:26 firewalla bro-run[26267]: checking configurations ...
Feb 18 18:20:26 firewalla bro-run[26267]: installing ...
Feb 18 18:20:26 firewalla bro-run[26267]: creating policy directories ...
Feb 18 18:20:26 firewalla bro-run[26267]: installing site policies ...
Feb 18 18:20:26 firewalla bro-run[26267]: generating cluster-layout.zeek ...
Feb 18 18:20:26 firewalla bro-run[26267]: generating local-networks.zeek ...
Feb 18 18:20:26 firewalla bro-run[26267]: generating zeekctl-config.zeek ...
Feb 18 18:20:26 firewalla bro-run[26267]: generating zeekctl-config.sh ...
Feb 18 18:20:26 firewalla bro-run[26267]: stopping ...
Feb 18 18:20:26 firewalla bro-run[26267]: stopping workers ...
Feb 18 18:20:26 firewalla bro-run[26267]: stopping proxy ...
Feb 18 18:20:26 firewalla bro-run[26267]: stopping manager ...
Feb 18 18:20:26 firewalla bro-run[26267]: starting ...
Feb 18 18:20:26 firewalla bro-run[26267]: starting manager ...
Feb 18 18:20:26 firewalla bro-run[26267]: starting proxy ...
Feb 18 18:20:26 firewalla bro-run[26267]: starting workers ...
Feb 18 18:20:26 firewalla root: FIREWALLA: Deployed zeek using zeekctl
Feb 18 18:20:26 firewalla bro-run[26267]: kernel.panic = 5
Feb 18 18:20:26 firewalla bro-run[26267]: kernel.panic_on_oops = 1
Feb 18 18:20:26 firewalla bro-run[26267]: kernel.core_pattern = |/bin/false
Feb 18 18:20:26 firewalla bro-run[26267]: vm.overcommit_memory = 1
Feb 18 18:20:26 firewalla bro-run[26267]: vm.swappiness = 60
Feb 18 18:20:26 firewalla bro-run[26267]: vm.page-cluster = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.ip_forward = 1
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.all.route_localnet = 1
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv6.conf.all.forwarding = 1
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv6.conf.all.accept_ra = 2
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.all.accept_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv6.conf.all.accept_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.all.secure_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.default.secure_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.all.send_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.default.send_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.all.send_redirects = 0
Feb 18 18:20:26 firewalla bro-run[26267]: net.core.default_qdisc = fq
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.tcp_congestion_control = cubic
Feb 18 18:20:26 firewalla bro-run[26267]: net.ipv4.conf.all.force_igmp_version = 2
Feb 18 18:20:26 firewalla bro-run[26267]: net.netfilter.nf_conntrack_tcp_timeout_established = 86400
Feb 18 18:20:26 firewalla root: FIREWALLA: BRO-RUN Finished
Feb 18 18:20:26 firewalla systemd[1]: Started BroFish.
Feb 18 18:20:26 firewalla systemd[1]: Stopping Regular background program processing daemon...
Feb 18 18:20:26 firewalla systemd[1]: Stopped Regular background program processing daemon.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 3485 (cron) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 3501 (bash) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 3508 (bash) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 3534 (sleep) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 24631 (bash) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 24635 (sleep) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 24641 (bash) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 24642 (bash) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 24644 (sleep) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: cron.service: Found left-over process 24647 (sleep) in control group while starting unit. Ignoring.
Feb 18 18:20:26 firewalla systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies.
Feb 18 18:20:26 firewalla systemd[1]: Started Regular background program processing daemon.
Feb 18 18:20:36 firewalla systemd[1]: Reloading FireRouter DNS.
Feb 18 18:20:36 firewalla systemd[1]: Reloaded FireRouter DNS.
Feb 18 18:20:45 firewalla systemd[1]: Reloading FireRouter DNS.
Feb 18 18:20:45 firewalla systemd[1]: Reloaded FireRouter DNS.
Feb 18 18:20:55 firewalla systemd[1]: Reloading FireRouter DNS.
Feb 18 18:20:55 firewalla systemd[1]: Reloaded FireRouter DNS.
kern.log
Feb 18 21:50:40 firewalla kernel: [123342.634611] device br2 left promiscuous mode
Feb 18 21:50:40 firewalla kernel: [123343.057195] device br2 entered promiscuous mode
Feb 18 21:50:50 firewalla kernel: [123353.193360] [PF_RING] Warning: jumbo mtu or snaplen (65535), resizing slots.. (num_slots = 512 x slot_len = 65584)
Feb 18 21:50:51 firewalla kernel: [123353.217493] [PF_RING] Warning: jumbo mtu or snaplen (65535), resizing slots.. (num_slots = 512 x slot_len = 65584)
Feb 18 21:50:51 firewalla kernel: [123353.225924] [PF_RING] Warning: jumbo mtu or snaplen (65535), resizing slots.. (num_slots = 512 x slot_len = 65584)
avahi-daemon.log
Feb 18 19:05:19 firewalla avahi-daemon[30925]: message repeated 29 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Feb 18 19:05:19 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 19:05:19 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 19:05:19 firewalla avahi-daemon[30925]: message repeated 16 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Feb 18 19:35:23 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 19:35:23 firewalla avahi-daemon[30925]: message repeated 21 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Feb 18 19:35:23 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 19:35:23 firewalla avahi-daemon[30925]: message repeated 3 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Feb 18 20:20:28 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 20:20:28 firewalla avahi-daemon[30925]: message repeated 13 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Feb 18 20:20:28 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 20:20:28 firewalla avahi-daemon[30925]: message repeated 25 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Feb 18 20:20:28 firewalla avahi-daemon[30925]: No slot available for legacy unicast reflection, dropping query packet.
Feb 18 20:20:28 firewalla avahi-daemon[30925]: message repeated 15 times: [ No slot available for legacy unicast reflection, dropping query packet.]
Setup
Firewalla (Router Mode) connected to Speedport Smart 3 (Telekom) as modem, PPPoE Connection
Netgear GS108Ev3 8 Port Switch connected to the Firewalla
Unifi 8 Lite Switch connected to the Netgear switch
-> 3 Unifi APs
-> Some Devices connected via LAN
Please sign in to leave a comment.
Comments
2 comments