Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Webconfigurator slow through MANAGEMENT interface after upgrade from 2.5.2 to 2.6.0

    Scheduled Pinned Locked Moved General pfSense Questions
    38 Posts 6 Posters 3.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • neterminN
      netermin @ColdBrew
      last edited by

      @sweber Do you have the zabbix agent installed?

      ColdBrewC 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @ColdBrew
        last edited by

        @sweber said in Webconfigurator slow through MANAGEMENT interface after upgrade from 2.5.2 to 2.6.0:

        Outbound filtering? Not that I know of

        Do you have rules in floating?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • ColdBrewC
          ColdBrew @netermin
          last edited by

          @netermin No Zabbix.

          @johnpoz No rules in floating.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @ColdBrew
            last edited by johnpoz

            @sweber said in Webconfigurator slow through MANAGEMENT interface after upgrade from 2.5.2 to 2.6.0:

            No rules in floating.

            Well have no idea how your blocking on the outbound direction then? Lack of state? The default deny rules are in/out

            if you look in the full rule set

            #---------------------------------------------------------------------------
            # default deny rules
            #---------------------------------------------------------------------------
            block in  inet all ridentifier 1000000103 label "Default deny rule IPv4"
            block out  inet all ridentifier 1000000104 label "Default deny rule IPv4"
            block in  inet6 all ridentifier 1000000105 label "Default deny rule IPv6"
            block out  inet6 all ridentifier 1000000106 label "Default deny rule IPv6"
            
            

            talking back to my workstation on the SECURE interface on PF02,

            What interface is that? lan or magement? Still not understanding why you would not just access the gui from the lan interface? Your having to setup a rule to allow it to talk to management from lan anyway? So why not just allow it to the lan IP? Gui going to listen on all IPs anyway.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            ColdBrewC stephenw10S 3 Replies Last reply Reply Quote 0
            • ColdBrewC
              ColdBrew @johnpoz
              last edited by

              @johnpoz LAN/SECURE are the same thing.

              I mean, I can just access it through SECURE, the previous admin just set it up with the management IP cause it made more sense I guess.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @ColdBrew
                last edited by

                @sweber said in Webconfigurator slow through MANAGEMENT interface after upgrade from 2.5.2 to 2.6.0:

                with the management IP cause it made more sense I guess.

                Yeah if you were on the management network... But accessing it the way you are from lan is going to be asymmetrical that is for sure.. And you showed that with your sniff..

                To be honest I don't know how it would have actually worked correctly.. Where you source natting before? If you source natted the traffic going to management IP from the lan, so it looked like it came from the other pfsense management IP then your return traffic wouldn't be asymmetrical

                Or if you host routed on your client to use either pf01 or pf02 lan IP to get to the specific management IP.. then again the return traffic wouldn't be asymmetrical.

                If the carp vip was owned by the specific pf you were going through for your gateway where the management IP was located it should work as well. But if you access the other pf managment IP from the lan its going to be asymmetrical return traffic - unless you could set reply-to on the traffic. Which I don't think you can do unless its a wan, this get set on a wan interface, unless you disable it. But I am not sure you could set specific reply-to on just normal interfaces?

                The easy solution is just access the lan IP of the pf you want to access the gui of when your on the lan network.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • ColdBrewC
                  ColdBrew @johnpoz
                  last edited by

                  @johnpoz I'll just start accessing it through the SECURE interface. I'm checking my rules though to double-check and make sure other SECURE clients can't access the web interface - I have a rule in here block any from SECURE to "This Firewall (Self)" after all my other PASS rules for things that do need to talk to the pfSense firewall explicitly (its own IP, versus using the CARP gateway IP).

                  But it's still letting clients go through PF01 to get to PF02's web interface, even though it has the same rules. Can I just make an alias with PF01 and PF02's SECURE addresses and block all traffic to those specifically (after all my PASS rules, of course)?

                  And just to double check, if you have DHCP server set up on both pfSense instances, when clients announce on the network that they're looking for a DHCP server, does pfSense respond with its own firewall address (10.30.0.2, for example), or does it respond with the CARP address (10.30.0.1)?

                  johnpozJ ColdBrewC 2 Replies Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @ColdBrew
                    last edited by

                    @sweber

                    https://docs.netgate.com/pfsense/en/latest/solutions/reference/highavailability/clusterconfiguration.html#setup-dhcp

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • ColdBrewC
                      ColdBrew @ColdBrew
                      last edited by

                      @sweber Wait nevermind, I just noticed I said clients are going through PF01 to get to PF02's web interface when it shouldn't be, since it doesn't need routing for a same-network connection.

                      I'm confusing myself, haha!

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator @johnpoz
                        last edited by

                        @johnpoz said in Webconfigurator slow through MANAGEMENT interface after upgrade from 2.5.2 to 2.6.0:

                        Well have no idea how your blocking on the outbound direction then? Lack of state?

                        Exactly it passes the TCP:SYN outbound on MGMT on PF01.
                        Then the SYN:ACK from PF02 goes dircet.
                        Then the client responds ACK, there must be something to allow that in on PF01 LAN, but it's blocked outbound on MGMT because it never saw the SYN:ACK.

                        Usually in that sort of setup you end up having to add sloppy-state/all-flags rules on every interface in the route, In and Out.

                        You might be able to just check the box though:
                        https://docs.netgate.com/pfsense/en/latest/troubleshooting/asymmetric-routing.html#automatic-fix

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.