• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

VMware Workstation VMs Web Traffic Being Blocked

Scheduled Pinned Locked Moved General pfSense Questions
221 Posts 6 Posters 51.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    stephenw10 Netgate Administrator
    last edited by Mar 10, 2022, 7:06 PM

    Can you pcap on the VMWare host interface? to see if it arrives there?

    D 1 Reply Last reply Mar 10, 2022, 7:24 PM Reply Quote 0
    • D
      DaddyGo @dfinjr
      last edited by Mar 10, 2022, 7:17 PM

      @dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:

      What do you think could cause that?

      as Stephen says " Can you pcap on the VMWare host interface?"

      pls. plug the laptop directly into the SG's port 4 and start a packet capture on both the box and the laptop

      BTW:
      if the .pcap is too big give us a dropbox or mega, etc link

      Cats bury it so they can't see it!
      (You know what I mean if you have a cat)

      1 Reply Last reply Reply Quote 0
      • D
        dfinjr @stephenw10
        last edited by Mar 10, 2022, 7:24 PM

        @stephenw10

        I want to make sure I capture this right. So I'll eliminate the switch, go direct host > netgate.

        Start a capture on the vm targeting this
        f9b25e28-f9ba-4c3e-bad1-da07666920db-image.png

        Then also capture such as this from Pfsense:
        b21294e8-243b-426e-b77d-07e3cf1bd68c-image.png

        If that is all correct, how long of a capture would you like?

        Please tune before the capture want to get you all what you need first shot.

        1 Reply Last reply Reply Quote 0
        • D
          dfinjr
          last edited by Mar 10, 2022, 7:29 PM

          FYI I have disconnected the switch from scenario so it is direct from netgate > vm hosting laptop.

          Still seeing the browsing issue but I know we're about to capture based on that, just wanted to let you know.

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Mar 10, 2022, 7:36 PM

            You should filter by the destination IP in pfSense if you can otherwise we see all the local traffic and make sure you set the packet count to 1000.

            On the other side try to capture on the VMWare host not the VM. We already have caps from the VM showing the large packets failing to arrive. We need to see if they arrive at the VM host interface.

            Steve

            D 1 Reply Last reply Mar 10, 2022, 8:20 PM Reply Quote 0
            • D
              dfinjr @stephenw10
              last edited by Mar 10, 2022, 8:20 PM

              @stephenw10
              So some difficulty here.

              attempting to capture packets I have this two virtual adapters on the hosting system:

              dfe92fbf-ade5-408f-9e0e-727249660589-image.png

              Very interesting. Just sniffing these two interface yield nothing. I go to .202 and browse to netgate.com and 0 packets show up on either of these.

              Did you mean the literal physical adapter on the host machine?

              J S 2 Replies Last reply Mar 10, 2022, 8:26 PM Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator @dfinjr
                last edited by johnpoz Mar 10, 2022, 8:36 PM Mar 10, 2022, 8:26 PM

                @dfinjr Those are like I showed you - those are for use say with natting or just a host network and only vms can only talk to each other.

                For someone that has multiple workstations running vm workstation, seem not to know much about how it works ;)

                virtual.jpg

                I am really curious where exactly use sniffed and on what - because when I snff on the physical interface of the host that is doing bridging like you said your doing.. I see duplicated packets.. Which is common on such a setup..

                https://ask.wireshark.org/question/8712/duplicate-packets-from-vmware-host/

                dupe.jpg

                There was actually a some what recent thread around here where user was seeing the dupe packets, and it was this because of his vm setup and what interface sniffing on, etc. But that is not actually what is going on the wire.. If you sniff elsewhere on the network..

                If you notice the time stamps - they are nano seconds apart, you are seeing as enters the bridge and when leaves the bridge. You can see the same sort of thing when sniffing on a vlan interface on a higher end switch, you see when it enters the vlan and when it leaves because your sniffing on the vlan and not specific interface. Same sort of thing here when your sniffing on a bridged interface..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • S
                  stephenw10 Netgate Administrator @dfinjr
                  last edited by Mar 10, 2022, 8:36 PM

                  @dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:

                  Did you mean the literal physical adapter on the host machine?

                  Yes I would start there. Make sure the replies from the external hosts are making it that far first. Since you only changed the Cisco for pfSense it seems something must be different. Though it's hard to see what!

                  D 1 Reply Last reply Mar 10, 2022, 9:11 PM Reply Quote 0
                  • D
                    dfinjr @stephenw10
                    last edited by Mar 10, 2022, 9:11 PM

                    @stephenw10
                    Sorry got held up with work, attempting the capture pieces now.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dfinjr
                      last edited by Mar 11, 2022, 12:09 AM

                      Apologize that took me so long everyone. Had some work stuff hit me between the eyes and beyond that I wanted to get a good clean capture, filtering out most of the noise by ports that don't matter to this. I think I have a good capture. 2 files: test2 capture was done from the VM hosting system listening just for the IP address 172.16.0.202 and not capturing anything to do with 3389 and 52311 (BigFix Port) and file packet capture-5 is from pfsense listening on the interface where the system resides but filtering out 3389 and 52311 again. I haven't analyzed this myself yet but think it is the most solid one I've captured yet. With the filters I was able to capture a far longer. Captured till the browser on the VM gave up and spit out an "err_timed_out". Please let me know what you think. packetcapture-5.cap test2.pcapng.gz

                      1 Reply Last reply Reply Quote 0
                      • D
                        dfinjr
                        last edited by Mar 11, 2022, 12:16 AM

                        @stephenw10 @johnpoz @DaddyGo

                        Think I finally got a good capture. I've added it to the forum.

                        @johnpoz

                        I'm doing my best with the VMware Workstation software. It isn't something I use outside of a means to an end and don't have any real professional experience with it. It hosts my VMs but I am far from an expert with it. Any educational points you can throw my way is of course appreciated.

                        D 1 Reply Last reply Mar 11, 2022, 10:13 AM Reply Quote 0
                        • S
                          stephenw10 Netgate Administrator
                          last edited by Mar 11, 2022, 1:21 AM

                          Ah, it looks like on the test2 cap, on the VMWare host, you filtered by 172.16.0.202 as destination so we don't see any of the traffic 172.16.0.202 is sending.
                          But that does mean we can see the large packets leaving the pfSense LAN and arriving at the VMWare host. If you filter by, for example, ip.addr == 151.101.2.219 again you can see that.

                          So given that those packets do not arrive at the actual VM it must be some issue with virtual networking dropping that.

                          It looks like none of the traffic leaving pfSense toward the VM host is flagged do-not-fragment. And it was previously. You might want to uncheck that setting in pfSense if it's still enabled because that should not be required.

                          Steve

                          D 2 Replies Last reply Mar 11, 2022, 1:46 AM Reply Quote 0
                          • D
                            dfinjr @stephenw10
                            last edited by Mar 11, 2022, 1:46 AM

                            @stephenw10
                            Thank you for the information Steve. I'll look at what I can do to alter the vmware configuration to allow the traffic to flow. Not sure what to do there but at least I can focus on it a bit more to see if I can get it to go.

                            Question is, in your opinion, with knowing that this is the way that the traffic was flowing from the ASA before, do you think that the Cisco appliance was shaping the traffic or something so that it could flow?

                            1 Reply Last reply Reply Quote 0
                            • D
                              dfinjr @stephenw10
                              last edited by Mar 11, 2022, 1:53 AM

                              @stephenw10
                              Also, this is the filter I did for the Wireshark. I did have the .202 IP but it was destination only:
                              067ec43b-ff88-49e3-b3c5-2ea117d968c8-image.png

                              1 Reply Last reply Reply Quote 0
                              • S
                                stephenw10 Netgate Administrator
                                last edited by Mar 11, 2022, 2:04 AM

                                If it's an MTU issue try testing that with large pings. You can just try pinging out from a VM to pfSense with do-not-fragment set and see where it fails. Or doesn't fail.

                                It seems like Cisco was reducing the path-mtu somehow. mss set perhaps? That might show in the cap we have from when it was in place...

                                1 Reply Last reply Reply Quote 0
                                • S
                                  stephenw10 Netgate Administrator
                                  last edited by Mar 11, 2022, 2:11 AM

                                  Or maybe we don't have a pcap taken when the Cisco was routing?

                                  D 2 Replies Last reply Mar 11, 2022, 2:14 AM Reply Quote 0
                                  • D
                                    dfinjr @stephenw10
                                    last edited by Mar 11, 2022, 2:14 AM

                                    @stephenw10
                                    packetcapture-6.cap VMhostSpeedTest.pcapng VMSpeedTest.pcapng

                                    Does this by chance show anything different. You're much faster on the analysis than I am. What I did is started a capture generic vlan on the pfsense, did a capture based on the vm host and the vm itself all fixated on speedtest.net.

                                    I started with a ping and then attempted to browse via IP over 443.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      stephenw10 Netgate Administrator
                                      last edited by Mar 11, 2022, 2:24 AM

                                      Most of this missed in the pfSense capture because 1000 packets only covers 8s.
                                      Still only seeing inbound traffic on the host but I wonder if that's a quirk of the bridge mode.
                                      The VM itself still doesn't see any of the full sized packets.

                                      Is there a pcap from when the Cisco was routing and traffic was working?

                                      D 1 Reply Last reply Mar 11, 2022, 2:27 AM Reply Quote 0
                                      • D
                                        dfinjr @stephenw10
                                        last edited by Mar 11, 2022, 2:25 AM

                                        @stephenw10
                                        If it would be helpful for me to do a packet capture on the Cisco I would be happy to. Just let me know. Thank you again for all the time you're giving this.

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          dfinjr @stephenw10
                                          last edited by Mar 11, 2022, 2:27 AM

                                          @stephenw10

                                          I'll get one for you now.

                                          Are you happy with the same filters as the capture before this one or anything you'd like for me to change on the capture?

                                          1 Reply Last reply Reply Quote 0
                                          120 out of 221
                                          • First post
                                            120/221
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received