• @5(1000000103) block drop in log inet all label "Default deny rule IPv4".

    7
    0 Votes
    7 Posts
    10k Views
    N
    @Jeonetgate Having this same issue as well on 2.4.4p3. No flush settings are enabled. Traffic is getting blocked by this default rule. ICMP traffic about 75% of it gets lost due to this. Do have two WANs configured.
  • 0 Votes
    3 Posts
    186 Views
    S
    I've switched over to AON NAT now, I didn't originally see all of the rules. Turned out that I didn't have an upstream gateway set. Once Set I see the rules automatically generated. I added my rule to disable NAT to create a routed network from my two servers. I still see an issue however. Can anyone suggest a fix or maybe a better way to achieve what I'm trying to do? I'll try and detail what the issue is... [image: 1585176123237-screen-shot-2020-03-25-at-3.41.24-pm.png] So it seems like it's an L2 issue... Here are the test details... Ping from Site1 Nested ESXi VM fails... The path is: Request: "n-esx1" -> "p-esx1" -> "p-esx2" -> "n-esx7" Reply: "n-esx7" -> "p-esx2" -> dfGW.... where I need it to go back to "p-esx1" n=Nested p=Physical [root@stevelab-n-esx1:/vmfs/volumes] ping 192.168.2.17 PING 192.168.2.17 (192.168.2.17): 56 data bytes For reference... Site1 WAN: 60:ac:a6 Site2 WAN: 7b:81:88 WAN GW: ff:fd:90 [root@stevelab-n-esx1:/vmfs/volumes] ping 192.168.2.17 PING 192.168.2.17 (192.168.2.17): 56 data bytes Destination Nested ESXi sees the request and replies to the request. [root@stevelab-n-esx7:/vmfs/volumes/3a3b5bc8-88bd4760] pktcap-uw --uplink vmnic0 --dir 2 --ip 192.168.1.11 -o - | tcpdump-uw -enr - 22:23:35.839598 00:0c:29:7b:81:9c > 00:0c:29:35:9b:0d, ethertype IPv4 (0x0800), length 98: 192.168.1.11 > 192.168.2.17: ICMP echo request, id 55660, seq 0, length 64 22:23:35.839758 00:0c:29:35:9b:0d > 00:0c:29:7b:81:9c, ethertype IPv4 (0x0800), length 98: 192.168.2.17 > 192.168.1.11: ICMP echo reply, id 55660, seq 0, length 64 Then the Physical host is sending the reply to the WAN GW. It doesn't send it back from where it came... [root@stevelab-p-esx2:/vmfs/volumes] pktcap-uw --uplink vmnic0 --dir 2 --ip 192.168.1.11 -o - | tcpdump-uw -enr – 22:24:09.239994 00:0c:29:60:ac:a6 > 00:0c:29:7b:81:88, ethertype IPv4 (0x0800), length 98: 192.168.1.11 > 192.168.2.17: ICMP echo request, id 55660, seq 18, length 64 22:24:09.240589 00:0c:29:7b:81:88 > 00:08:e3:ff:fd:90, ethertype IPv4 (0x0800), length 98: 192.168.2.17 > 192.168.1.11: ICMP echo reply, id 55660, seq 18, length 64 22:24:10.241698 00:0c:29:60:ac:a6 > 00:0c:29:7b:81:88, ethertype IPv4 (0x0800), length 98: 192.168.1.11 > 192.168.2.17: ICMP echo request, id 55660, seq 19, length 64 22:24:10.242331 00:0c:29:7b:81:88 > 00:08:e3:ff:fd:90, ethertype IPv4 (0x0800), length 98: 192.168.2.17 > 192.168.1.11: ICMP echo reply, id 55660, seq 19, length 64 [root@stevelab-p-esx2:/vmfs/volumes] esxcli network ip neighbor list Neighbor Mac Address Vmknic Expiry State Type 10.33.72.65 00:0c:29:60:ac:a6 vmk0 928 sec Unknown 10.33.72.64 00:0c:29:8c:15:73 vmk0 1196 sec Unknown 10.33.72.62 00:11:32:a6:9a:3f vmk0 1020 sec Unknown 10.33.75.253 00:08:e3:ff:fd:90 vmk0 1198 sec Unknown Reply never arrives back at Site1 (Of course, because the packet went to the WAN GW of Site2. [root@stevelab-p-esx1:~] pktcap-uw --uplink vmnic0 --dir 2 --ip 192.168.1.11 -o - | tcpdump-uw -enr - 22:24:24.270369 00:0c:29:60:ac:a6 > 00:0c:29:7b:81:88, ethertype IPv4 (0x0800), length 98: 192.168.1.11 > 192.168.2.17: ICMP echo request, id 55660, seq 33, length 64 22:24:25.271133 00:0c:29:60:ac:a6 > 00:0c:29:7b:81:88, ethertype IPv4 (0x0800), length 98: 192.168.1.11 > 192.168.2.17: ICMP echo request, id 55660, seq 34, length 64 22:24:26.271396 00:0c:29:60:ac:a6 > 00:0c:29:7b:81:88, ethertype IPv4 (0x0800), length 98: 192.168.1.11 > 192.168.2.17: ICMP echo request, id 55660, seq 35, length 64 Willing to try just about anything... Thanks.
  • Route Traffic from Site2 over VTI to Site1

    5
    0 Votes
    5 Posts
    501 Views
    J
    Well whatever was going on seems to be transient as things seem to be working now, although with the current situation extremely slow and laggy.
  • Hypothetical routing question

    3
    0 Votes
    3 Posts
    377 Views
    P
    @Derelict Thanks bud, we just tested what you said and it worked beautifully. The process was a bit tricky to understand because they used Unifi on the opposite side but after letting go of preconceptions and just tried everything just popped into place.
  • Allowing Failover Wan into my LAN

    1
    0 Votes
    1 Posts
    162 Views
    No one has replied
  • Dual WAN OpenVPN Peer-to-Peer Routing Problem

    1
    0 Votes
    1 Posts
    95 Views
    No one has replied
  • multiple networks on 1 interface

    4
    0 Votes
    4 Posts
    426 Views
    J
    ok, thanks for the help. i have it sorted. and Vlans worked PERFECTLY. Cheers Jason
  • Phone System behind pfsense

    1
    0 Votes
    1 Posts
    232 Views
    No one has replied
  • 0 Votes
    9 Posts
    704 Views
    S
    Sorry for making you so upset. TBH, I thought the info above was OK, and you initially seem to grasp that, but obviously I have annoyed you for some reason, and for that I can only apologise As mentioned, the issue was at the layer 2 level with ARP and the response for some reason not making it back to client when querying the gateway. This was a genuine query but I fear it has has deteriated. Once again, thank your for you input.
  • Wan on LAN

    1
    0 Votes
    1 Posts
    199 Views
    No one has replied
  • VPN Gateway for LAN based Open VPN server

    7
    0 Votes
    7 Posts
    606 Views
    S
    Actually, that's default behavior of the XG-7100. Lagg0 is an aggregate of ix2 and ix3, interfaces internal to the chassis that provide trunking for the 8 ports on the front face. [image: 1584573892250-lagg.png]
  • DHCP on OPT If working but no Access to WAN [SOLVED]

    6
    0 Votes
    6 Posts
    756 Views
    noplanN
    @noplan done the same again like the pen and paper check took the same switch (old habits die hard) same problem --> wtf took a brand new switch workin like a charm checked the old switch .... some crazy folk just done some MAC ACL testing on some random ports reset the old switch now workin like a charm so SOLVED
  • Router Setting

    1
    0 Votes
    1 Posts
    164 Views
    No one has replied
  • XG-1537 HA Pair - Dual WAN + Point to Point

    1
    0 Votes
    1 Posts
    185 Views
    No one has replied
  • 0 Votes
    1 Posts
    78 Views
    No one has replied
  • Connecting to 2 servers on same port from 2 public IP's

    10
    0 Votes
    10 Posts
    858 Views
    johnpozJ
    This one on your proxmox - is this doing nat? What your doing is correct. I would go through the troubleshooting doc. https://docs.netgate.com/pfsense/en/latest/nat/port-forward-troubleshooting.html What your doing is fine you can have multiple IPs sending to port 80 behind... I would validate that traffic is actually getting to pfsense wan, and then sending it on... This can be done with packet captures on pfsense, under the diag menu.. If I had to guess its your proxmox setup - firewall maybe on it? And access from other than your local network? Did you setup the vip correctly? When you do a vip, it should be available via your dropdown when you do port portward.. example.. [image: 1584487604154-vip.jpg] And the mask should be what your network on your wan is using.. Do you have like a /29 or something? Where this address block is coming from?
  • Setup PIA With dual wan/failover gateway

    1
    0 Votes
    1 Posts
    91 Views
    No one has replied
  • 0 Votes
    4 Posts
    412 Views
    S
    Have a cocktail. Done and Done Much appreciated
  • Third "physical" vmxnet3 NIC won't show up in ifconfig nor in Web GUI

    4
    0 Votes
    4 Posts
    141 Views
    E
    Thank you both very much! I added the NIC and then rebooted the first time. Now I've followed your advice which worked like a charm.
  • New PFSENSE version causing problems

    17
    0 Votes
    17 Posts
    1k Views
    DerelictD
    If the DHCP server was giving you bogus DNS servers you can expect delays in anything on the firewall that was looking to resolve names. Totally normal.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.