There is one host on my green network that is generating most and a lot of the broadcast network discovery traffic in my ipFire firewall logs. Here’s a snippet from the log showing traffic sourced from host forwarded to the ipFire device(?). I don’t know why this host is so “nosey”; there’s no good reason for it to be, AFAIK. Can I create a firewall rule to block the broadcasting of this network discovery traffic? (Does the ipFire router handle the broadcasting or do any switches in the mix handle it?)
I don’t think that you’re going to solve this with a firewall rule. If I understand it correctly, you have one aberrant host that’s sending broadcast packets. You need to look at that host to figure out why. As is evident from the logs you included, the firewall is doing what it should and dropping the packets when it receives them.
Firewalls/routers, in general, drop broadcast packets.
Switches forward broadcast packets to all ports except the one the packet was received on. Switches are doing this based on the broadcast MAC address (ff:ff:ff:ff:ff:ff), not the IP.
Thank you for your response. Question, if “Firewalls/routers, in general, drop broadcast packets.” why is ipFire reporting INPUTFW and not DROP? I presume that INPUTFW means it is being forwarded to ipFire and perhaps ipFire is responding to it?