If conntrack is configured on input in firewall it affects forward traffic.
It can lead to performance degradation.
How to reproduce:
Network map
Host(192.168.0.2)-----(eth0 192.168.0.1)VyOS(eth1 192.168.1.1) ----Host(192.168.1.2)
Configuration:
set firewall ipv4 input filter default-action 'drop' set firewall ipv4 input filter rule 10 action 'accept' set firewall ipv4 input filter rule 10 protocol 'icmp' set firewall ipv4 input filter rule 20 action 'accept' set firewall ipv4 input filter rule 20 state 'related' set firewall ipv4 input filter rule 20 state 'established' set interfaces ethernet eth0 address '192.168.0.1/24' set interfaces ethernet eth1 address '192.168.1.1/24'
Run ping from Host 192.168.0.2 to Host 192.168.1.2
vyos@vyos:~$ sudo conntrack -L icmp 1 29 src=192.168.0.2 dst=192.168.1.2 type=8 code=0 id=3318 src=192.168.1.2 dst=192.168.0.2 type=0 code=0 id=3318 mark=0 use=1 conntrack v1.4.7 (conntrack-tools): 1 flow entries have been shown.
As we can see, we did not configure conntrack rules on forward, but conntrack flow exists