• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Problem with snapshot 3/31 16:19:49

CE 2.7.0 Development Snapshots (Retired)
6
46
9.3k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    JonathanLee @jimp
    last edited by JonathanLee Apr 1, 2022, 4:00 PM Apr 1, 2022, 3:59 PM

    @jimp You got it thanks for the help

    here is your request this was the original settings, I have tried to delete the one line however it re adds

    Outbound NAT rules (automatic)

    Subnets to NAT

    tonatsubnets = "{ 127.0.0.0/8 ::1/128 192.168.0.0/16 }"
    nat on $WAN inet from $tonatsubnets to any port 500 -> 64.113.111.129/32 static-port
    nat on $WAN inet6 from $tonatsubnets to any port 500 -> (mvneta0) static-port
    nat on $WAN inet from $tonatsubnets to any -> 64.113.111.129/32 port 1024:65535
    nat on $WAN inet6 from $tonatsubnets to any -> (mvneta0) port 1024:65535

    TFTP proxy

    rdr-anchor "tftp-proxy/*"

    NAT Inbound Redirects

    rdr on mvneta1 inet proto { tcp udp } from 192.168.0.0/16 to any port $DNS -> 192.168.1.1
    no nat on mvneta1 inet proto tcp from (mvneta1) to 192.168.0.0/16
    nat on mvneta1 inet proto tcp from 192.168.0.0/16 to 192.168.1.1 port $DNS -> (mvneta1)

    rdr on mvneta1 inet6 proto { tcp udp } from any to any port $DNS -> ::1
    rdr on mvneta1 inet proto udp from 192.168.0.0/16 to any port 123 -> 192.168.1.1
    no nat on mvneta1 inet proto tcp from (mvneta1) to 192.168.0.0/16
    nat on mvneta1 inet proto tcp from 192.168.0.0/16 to 192.168.1.1 port 123 -> (mvneta1)

    rdr on mvneta1 inet6 proto udp from any to any port 123 -> ::1

    Setup Squid proxy redirect

    rdr pass on mvneta1 inet proto tcp from any to !(mvneta1) port 80 -> 127.0.0.1 port 3128
    rdr pass on mvneta1 inet proto tcp from any to !(mvneta1) port 443 -> 127.0.0.1 port 3129

    Make sure to upvote

    1 Reply Last reply Reply Quote 0
    • J
      JonathanLee @jimp
      last edited by JonathanLee Apr 1, 2022, 4:09 PM Apr 1, 2022, 4:03 PM

      @jimp

      This is my NAT for DNS and NTP

      I force them to use the firewall

      login-to-view

      This setting has worked for some time now I get time from the firewall no matter what wan ip address a device requests for NTP. I had issues with time being jumped 15-20 mins without this nat setting for NTP, no clue why so I added a rule that let the firewall handle all NTP requests, after that no issues with time jumps

      Make sure to upvote

      1 Reply Last reply Reply Quote 0
      • J
        jimp Rebel Alliance Developer Netgate
        last edited by Apr 1, 2022, 4:08 PM

        Do you have NAT reflection enabled globablly or on those rules? If so, disable it.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        J 1 Reply Last reply Apr 1, 2022, 4:11 PM Reply Quote 1
        • J
          JonathanLee @jimp
          last edited by Apr 1, 2022, 4:11 PM

          @jimp

          Network Address Translation Settings for Firewall

          login-to-view

          All is disabled

          login-to-view

          Make sure to upvote

          1 Reply Last reply Reply Quote 0
          • J
            jimp Rebel Alliance Developer Netgate
            last edited by Apr 1, 2022, 4:15 PM

            There is also a per-rule option on the individual port forwards. Is it enabled there?

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            J 1 Reply Last reply Apr 1, 2022, 4:16 PM Reply Quote 0
            • J
              jimp Rebel Alliance Developer Netgate
              last edited by Apr 1, 2022, 4:16 PM

              Also your port forward target should really be 127.0.0.1 and not 192.168.1.1, assuming 192.168.1.1 is the LAN address of the firewall.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              J 1 Reply Last reply Apr 1, 2022, 4:18 PM Reply Quote 1
              • J
                JonathanLee @jimp
                last edited by Apr 1, 2022, 4:16 PM

                @jimp

                Firewall ruleslogin-to-view

                Make sure to upvote

                1 Reply Last reply Reply Quote 0
                • J
                  JonathanLee @jimp
                  last edited by JonathanLee Apr 1, 2022, 4:28 PM Apr 1, 2022, 4:18 PM

                  @jimp said in Problem with snapshot 3/31 16:19:49:

                  127.0.0.1

                  correct to loopback address

                  login-to-view

                  login-to-view

                  filter reload failed at same point as before with loopback address

                  Make sure to upvote

                  1 Reply Last reply Reply Quote 0
                  • J
                    jimp Rebel Alliance Developer Netgate
                    last edited by Apr 1, 2022, 4:22 PM

                    Did you reboot after making that change? Once you get the error you have to reboot to know if it's fixed. Also check and see if those no nat on rules are still present.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    J 1 Reply Last reply Apr 1, 2022, 4:25 PM Reply Quote 1
                    • J
                      JonathanLee @jimp
                      last edited by Apr 1, 2022, 4:25 PM

                      @jimp

                      I have to wait for 2 hours to do a reboot I am at work and the firewall must be up for 2 hours. I have changed the NTP and DNS to use the loopback 127, the no nat rules still show in debug if you delete them they return. Thanks I will reboot at 11:10am

                      Make sure to upvote

                      1 Reply Last reply Reply Quote 0
                      • J
                        jimp Rebel Alliance Developer Netgate
                        last edited by Apr 1, 2022, 4:28 PM

                        OK, I see the real source of your duplicate rules now and I can replicate it here. Your destination on those port forwards is Any and it should not be set to that. You should set that to ! LAN address (so check the Invert Match box for the destination and then set the destination to LAN Address)

                        As described in the docs:
                        https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        J 2 Replies Last reply Apr 1, 2022, 4:32 PM Reply Quote 1
                        • J
                          JonathanLee @jimp
                          last edited by Apr 1, 2022, 4:32 PM

                          @jimp

                          I have corrected this to inverted

                          login-to-view

                          Make sure to upvote

                          1 Reply Last reply Reply Quote 1
                          • J
                            jimp Rebel Alliance Developer Netgate
                            last edited by Apr 1, 2022, 4:33 PM

                            That looks good, if you look in /tmp/rules.debug now you shouldn't see those no nat on rules under the rdr rules for those port fowards. If that is the case, you should be in good shape after a reboot.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            J 2 Replies Last reply Apr 1, 2022, 4:34 PM Reply Quote 1
                            • J
                              JonathanLee @jimp
                              last edited by Apr 1, 2022, 4:34 PM

                              @jimp

                              They are gone now, I wonder why that worked for so long before this update.

                              Outbound NAT rules (automatic)

                              Subnets to NAT

                              tonatsubnets = "{ 127.0.0.0/8 ::1/128 192.168.0.0/16 }"
                              nat on $WAN inet from $tonatsubnets to any port 500 -> 64.113.111.129/32 static-port
                              nat on $WAN inet6 from $tonatsubnets to any port 500 -> (mvneta0) static-port
                              nat on $WAN inet from $tonatsubnets to any -> 64.113.111.129/32 port 1024:65535
                              nat on $WAN inet6 from $tonatsubnets to any -> (mvneta0) port 1024:65535

                              TFTP proxy

                              rdr-anchor "tftp-proxy/*"

                              NAT Inbound Redirects

                              rdr on mvneta1 inet proto { tcp udp } from 192.168.0.0/16 to !192.168.1.1 port $DNS -> 127.0.0.1
                              rdr on mvneta1 inet proto udp from 192.168.0.0/16 to !192.168.1.1 port 123 -> 127.0.0.1

                              Setup Squid proxy redirect

                              rdr pass on mvneta1 inet proto tcp from any to !(mvneta1) port 80 -> 127.0.0.1 port 3128
                              rdr pass on mvneta1 inet proto tcp from any to !(mvneta1) port 443 -> 127.0.0.1 port 3129

                              UPnPd rdr anchor

                              rdr-anchor "miniupnpd"

                              Make sure to upvote

                              1 Reply Last reply Reply Quote 0
                              • J
                                JonathanLee @jimp
                                last edited by Apr 1, 2022, 4:36 PM

                                @jimp

                                Thank you for your help with this and all you do.

                                Make sure to upvote

                                1 Reply Last reply Reply Quote 0
                                • J
                                  jimp Rebel Alliance Developer Netgate
                                  last edited by Apr 1, 2022, 4:39 PM

                                  The update has a problem with duplicate rules. We're still working on a fix, but in the meantime you can work around it by eliminating the duplicate rules. Most people get them from reflection + VIPs, but in your case it was port forwards with a destination of Any.

                                  I'm surprised those port forwards worked well at all, they would have been looping traffic around a bit since even a query sent to the firewall would be caught and then redirected to ... the firewall. Unnecessarily. Port forwards for a destination of Any have a long history of problems.

                                  See also:

                                  • https://redmine.pfsense.org/issues/13011
                                  • https://redmine.pfsense.org/issues/13012
                                  • https://redmine.pfsense.org/issues/13015

                                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                  Need help fast? Netgate Global Support!

                                  Do not Chat/PM for help!

                                  J 3 Replies Last reply Apr 1, 2022, 5:16 PM Reply Quote 1
                                  • J
                                    JonathanLee @jimp
                                    last edited by JonathanLee Apr 1, 2022, 5:24 PM Apr 1, 2022, 5:16 PM

                                    @jimp

                                    The update forced me to use a more efficient configuration, Amazing, glad I waited it out. On a side note we are talking about efficiency in algorithm complexity in Java class this week. Again, I never thought about having to program dynamic conditional expressions for user configuration errors until today. Example if users programs routers ip in nat default to loopback, and or throw exception. Easier said then done I am sure. The routers Ip can be different, and each Nat rule can be different because of the packages in use.

                                    Make sure to upvote

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      JonathanLee @jimp
                                      last edited by Apr 1, 2022, 6:17 PM

                                      @jimp

                                      This fixed it however i-cap will not start or clamAV any longer all errors for filter issues are gone and filter shows states logs now again.

                                      Make sure to upvote

                                      G 1 Reply Last reply Apr 1, 2022, 6:41 PM Reply Quote 0
                                      • G
                                        grandrivers @JonathanLee
                                        last edited by Apr 1, 2022, 6:41 PM

                                        @jonathanlee yes I have many packages that dont start now
                                        avahi
                                        lldpd
                                        ntopng
                                        ssftlowd
                                        vnstatd

                                        /etc/rc.packages: The command '/usr/local/etc/rc.d/avahi-daemon.sh stop' returned exit code '2', the output was '/usr/local/etc/rc.d/avahi-daemon.sh: 17: Syntax error: "}" unexpected'

                                        /rc.start_packages: The command '/usr/local/etc/rc.d/ntopng.sh stop' returned exit code '2', the output was '/usr/local/etc/rc.d/ntopng.sh: 29: Syntax error: "}" unexpected'
                                        

                                        pfsense 2.4 super micro A1SRM-2558F
                                        C2558 8gig ECC  60gig SSD
                                        tripple Wan dual pppoe

                                        J 1 Reply Last reply Apr 1, 2022, 6:45 PM Reply Quote 0
                                        • J
                                          JonathanLee @grandrivers
                                          last edited by Apr 1, 2022, 6:45 PM

                                          @grandrivers

                                          Apr 1 11:21:13 (squid-1) 86303 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:21:24 (squid-1) 26626 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:21:36 (squid-1) 50467 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:21:47 (squid-1) 53928 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:21:59 (squid-1) 56555 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:22:10 (squid-1) 59214 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:22:22 (squid-1) 63577 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:22:34 (squid-1) 78058 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:22:45 (squid-1) 91402 FATAL: UFSSwapDir::openLog: Failed to open swap log.
                                          Apr 1 11:22:47 php-fpm 402 /pkg_edit.php: Configuration Change:

                                          This is my only issue now

                                          Make sure to upvote

                                          1 Reply Last reply Reply Quote 0
                                          25 out of 46
                                          • First post
                                            25/46
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.