That rule will match traffic from LAN net to LAN address (which is included in LAN net) as was correctly pointed out already by @JasonJoel.
The rule is pointless unless it is passing traffic to LAN address (or maybe other VIPs on the LAN interface) that you need to be passed.
If you're wondering what the traffic is, enable logging on the rule and watch the logs.
There are no "rare events." Traffic is either same-subnet (not requiring router services) or it's not.
I get that logic, but if it's 100% accurate, it would never have fired at any point because it would be routing by the switch and never touching pfsense.
My hardware setup is Pfsense -- Wire -- Switch -- Everything else.
The only thing on that subnet that isn't on the far end of the switch is pfsense itself.
I get that the rule SHOULDN'T do anything, but as my screenshot shows, there is something hitting it that's matching it.
Perhaps I'm misunderstanding but the way everyone keeps explaining it, it should never fire, but if I look at the state by clicking it, it's showing an IP to a broadcast IP.
So, if that's getting passed, wouldn't removing it cause it to be blocked by the RFC1918 block rule that comes next?
"whatever is triggering it will get blocked by the rule 2 spots below it."
That is not how it works, first rule to trigger wins no other rules below that will be evaluated.
Rules are evaluated top down, first 1 that triggers stops further evaluation. Rules need to be ordered in this fashion.
I meant if I remove the rule that everyone is saying does nothing.
The rule 2 down blocks all RFC1918 as a destination. So without that pass, whatever is triggering it would be blocked as that block happens prior to the allow any at the bottom.