Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Traffic going through wrong interface (imminent bug)

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    12 Posts 4 Posters 1.4k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V Offline
      viragomann @cpaixao
      last edited by

      @cpaixao
      It seems that your VLANs are not separated properly.
      As you can see in the log, the source IP of the packets coming in on LAN_ACERTO is out of 192.168.25.0/24, which shouldn't be, when the separations works.

      Possibly your switch is not configured accordingly.

      C 1 Reply Last reply Reply Quote 0
      • C Offline
        cpaixao @viragomann
        last edited by cpaixao

        @viragomann said in Traffic going through wrong interface (imminent bug):

        192.168.25.0/24

        Hi @viragomann ,

        First of all, thanks for sharing your feedback.

        I might be missing something on what you just said, because the printscreen above should show only outgoing traffic. That is, 192.168.25.0/24 ( A - LAN_ACERTO) sending packages to remote host, not the otherwise.

        At the same time, with the img I meant to demonstrate that a rule attached to interface B - CF_VLAN is seemly to block packets that should come over (A - LAN_ACERTO, range 192.168.25.1/24).

        Besides, such uncommon behavior has started a few weeks ago when we updated to v2.6 and we haven't changed anything in the switch configuration by then.

        Would you mind to go a little deeper in your analysis, please? As I said, maybe I'm missing something, and if that's the case, please accept my apologizes.

        Regards,

        V 1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann @cpaixao
          last edited by

          @cpaixao
          Okay, but above you stated other network ranges for the interfaces:

          We have an interface (A - "CF_VLAN") that is assigned to 192.168.25.1/24 range, phisical interface em2, default VLAN; Most of our regular traffic uses that interface.

          But we also have another interface (B - "LAN_ACERTO") that right now should be out of use: 192.168.70.1/28 range, phisical interface em2, VLAN 70;

          Without getting correct data it's pretty hard to help.

          To get a more reliable idea which rules are blocking or passing the traffic enable displaying of rule descriptions in Status > System Logs > Settings and ensure that you stated a description in your firewall rules.

          C 1 Reply Last reply Reply Quote 0
          • C Offline
            cpaixao @viragomann
            last edited by cpaixao

            Hi @viragomann ,

            You're absolutely correct about my OP - I got mixed up while writing it. I'm sorry about that. For proper understanding, and since I can't edit there anymore, I'm re-writing the first paragraph:

            "Our Netgate PFSense is showing an abnormal behavior since we last updated, version 2.6.0.
            We have an interface (A - "LAN_ACERTO") that is assigned to 192.168.25.1/24 range, phisical interface em2, default VLAN; Most of our regular traffic uses that interface.

            But we also have another interface (B - "CF_VLAN") that right now should be out of use: 192.168.70.1/28 range, phisical interface em2, VLAN 70;"

            I double-checked and the rest of that post is correct and accurate.

            We do rule description (at least most for most of them). The particular rule in that screenshot is likely to be an aut-generated rule, since I couldn't find that in any interface that we have in Firewall > Rules. I suspect that is from Suricata, tbh.

            BTW, just to be sure, I've checked our switch and everything looks fine. I would appreciate any other idea.

            Regards,

            1 Reply Last reply Reply Quote 0
            • C Offline
              cpaixao
              last edited by

              Hi everyone,

              The problem persists. Any help is really welcome, so please don't hesitate.

              Regards,

              1 Reply Last reply Reply Quote 0
              • stephenw10S Offline
                stephenw10 Netgate Administrator
                last edited by

                You can see that the rule associate with that tracker ID is by checking the file /tmp/rules.debug.

                However it's almost certainly the antispoof rule for LAN_ACERTO:

                antispoof log for $LAN ridentifier 1000002620
                

                That is correctly blocking traffic with a source IP in the LAN_ACERTO subnet entering via a different interface. That can only happen if it is somehow being tagged as VLAN 70.

                You can try running a packet capture on em2 directly to see exactly what traffic is coming in and how it is tagged.

                Steve

                C 1 Reply Last reply Reply Quote 1
                • C Offline
                  cpaixao @stephenw10
                  last edited by cpaixao

                  Hi @stephenw10 , thanks for your insight.

                  You're right about the the antspoof rule. Thanks to your input, I managed to check that:

                  481527d8-028a-4e71-9f48-6b1c01197a46-image.png

                  When it comes to checking the packets content to see if VLAN 70 is tagged though, apparently it isn't. I am attaching the .cap files and firewall log. I'd would be really glad if you could double-check those, please. This is how the firewall reported when I tried to run a simple sudo apt-get update in one of our servers that is showing the "CF_VLAN" issue. Notice that the firewall shows that it is traffic comes out from CF_VLAN (when it is actually from LAN_ACERTO)

                  de8844d6-2c38-436e-b5ed-97b3d79e196c-image.png

                  At the same time I captured the traffic running a Diagnostics > Packet Capture. Log attached.

                  Best regards,
                  packetcapture cpaixao.7z

                  Edit: BTW, the capture was run on the LAN_ACERTO Interface

                  1 Reply Last reply Reply Quote 0
                  • C Offline
                    cpaixao
                    last edited by

                    Hi everyone,

                    I just want to let you guys know that in the meanwhile and, given the clue that @stephenw10 gave me, I am investigating a cable that possibly is plugged where it shouldn't be. I'm not sure if I've mentioned before, but nowadays we shouldn't be ANY traffic at VLAN 70, that should be completely shut now because we simply don't run any services there anymore.

                    e7ae3ba5-a76c-4506-8690-c5893f5953c0-image.png

                    That a picture from one of our switches, showing that there is a cable plugged on one port that is VLAN 70 assigned

                    e03a9d8e-834b-437e-b6f5-805aa79ba4f5-image.png

                    I'll keep you updated.

                    Regards,

                    M 1 Reply Last reply Reply Quote 0
                    • M Offline
                      mer @cpaixao
                      last edited by

                      @cpaixao I learned a long time ago to check and double check physical connectivity. Never assume you know how things are plugged in because all it takes is someone "helping you" and moving cables.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S Offline
                        stephenw10 Netgate Administrator
                        last edited by

                        Ok if em2 is assigned directly as LAN_ACERTO then you should see VLAN70 tagged packets on it. But you probably need to enable promiscuous mode and you need to capture more packets.
                        I would go at least 1000. If that UDP traffic is coming in and being blocked on either interface then it should appear there.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • C Offline
                          cpaixao
                          last edited by

                          Hi folks,

                          The problem was indeed a cable plugged into wrong switch port. The funny fact is that that mistake was actually done in January, but only now things started to break. Anyways... thanks everyone for assisting me.

                          Best regards,

                          1 Reply Last reply Reply Quote 2
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.