Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TCP:SA Block and Default Deny Rule 1000000103

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 2 Posters 1.5k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ Offline
      johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
      last edited by

      @pomegranatesculpordwarffargo said in TCP:SA Block and Default Deny Rule 1000000103:

      Protocol: TCP:SA

      Such blocks scream asymmetrical traffic..

      So 10.0.101.20 is trying to talk to 10.0.100.30 and sent it a SYN to open up a connection on port 8080.. So 10.0.100.30 answering back its syn,ack sent it to pfsense, but pfsense didn't ever see the SYN..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

      P 1 Reply Last reply Reply Quote 0
      • P Offline
        pomegranatesculpordwarffargo @johnpoz
        last edited by

        @johnpoz said in TCP:SA Block and Default Deny Rule 1000000103:

        asymmetrical traffic

        Thanks for the quick reply and narrowing down to asymmetric traffic problem.

        I'm still new to pfsense, any approach or strategy you used to go about fixing it?
        Its weird because the plex web gui in the same setup works fine.

        Thanks again and appreciate any thoughts you have.

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ Offline
          johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
          last edited by

          @pomegranatesculpordwarffargo going to need more to go on here.

          When 10.0.101.20 sent a syn to 10.0.100.30 why did it not go thru pfsense? Is there some other router in play here?

          Wrong mask? Where 100.30 and 101.20 are really on the same L2 network, so 20 could talk to 30, but 30 said oh I Need to send the answer to pfsense?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

          P 1 Reply Last reply Reply Quote 0
          • P Offline
            pomegranatesculpordwarffargo @johnpoz
            last edited by pomegranatesculpordwarffargo

            @johnpoz Nope no other router in play strickly pfsense, netgear switch and unraid (nas) box.

            10.0.101.20 (Windows VM running on unraid) is on a vlan and unraid is on its own seperate vlan.
            Masks and L2 network look good and certain webui's like plex will work.

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
              last edited by

              @pomegranatesculpordwarffargo Well something not like you think, because if they were you wouldn't be blocking on SA... which means pfsense never saw the original SYN.

              Lets see a traceroute from 10.0.101.20 to 10.0.100.30

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

              P 1 Reply Last reply Reply Quote 0
              • P Offline
                pomegranatesculpordwarffargo @johnpoz
                last edited by

                @johnpoz Ah! Ok you're right as expected!

                Traceroute is fine for 10.0.100.30 to really anywhere.
                But 10.0.101.20 to 10.0.100.30 or anywhere else timesout.

                Result
                1 * * *
                2 * * *
                3 * * *
                4 * * *

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
                  last edited by johnpoz

                  @pomegranatesculpordwarffargo said in TCP:SA Block and Default Deny Rule 1000000103:

                  But 10.0.101.20 to 10.0.100.30 or anywhere else timesout.

                  So you got something wrong there for sure - the first hit should be pfsense IP on that network..

                  So clearly something is not how you think it is..

                  Here is trace from one of my networks, to other network device.

                  $ tracert -d 192.168.2.12
                  
                  Tracing route to 192.168.2.12 over a maximum of 30 hops
                  
                    1    <1 ms    <1 ms    <1 ms  192.168.9.253
                    2     1 ms    <1 ms    <1 ms  192.168.2.12
                  
                  Trace complete.
                  

                  First hop is pfsense IP, my gateway off 192.168.9/24, next hop is the destination.

                  Reverse..

                  traceroute to 192.168.9.10 (192.168.9.10), 64 hops max
                    1   192.168.2.253  0.370ms  0.309ms  0.271ms 
                    2   192.168.9.10  0.517ms  0.430ms  0.378ms 
                  user@NewUC:/$ 
                  

                  Where 192.168.2.253 is pfsense IP on that 192.168.2/24 network..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                  P 1 Reply Last reply Reply Quote 0
                  • P Offline
                    pomegranatesculpordwarffargo @johnpoz
                    last edited by

                    @johnpoz Thanks and yep! I get similair looking readouts from traceroute for 10.0.100.30 and acutally another vm on another vlan I got.

                    But 10.0.101.20 seems to be stubborn.

                    The subnet masks match in the dhcp server in pfsense.
                    So am I mistaken then that you're thinking the problem is in the L2 network or is there somewhere else I should be looking?

                    Thanks!

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ Offline
                      johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
                      last edited by johnpoz

                      @pomegranatesculpordwarffargo you need to figure out why pfsense not seeing the syn.

                      If pfsense saw the syn, then it wouldn't be blocking the syn,ack - because there would be a state that allows it.

                      So simple test, is sniff on your source client there wanting to talk to 10.0.100.30, when you ping 10.0.100.30 where does it go?? In the sniff you will see the mac address it goes to, if that was pfsense mac address - then it would be seeing the syn, and wouldn't block the syn,ack..

                      A block of syn,ack is out of state traffic. So either pfsense never saw the syn to open the state.. Or the SA coming in on the wrong interface that it should be? And it doesn't match up to the state.. Look in your state table when you try and talk to the 100.30 box from 101.20 - do you see the state?

                      Are you states being reset, seems unlikely that is the reason or you would see blocks from other connections, etc.

                      Here if I talk to one of my vms on the 192.168.2.12 network, running on my NAS, from my 192.168.9.100 box..

                      I can see the state my 9.100 creates to 2.12 on port 8443, and then you see the response.

                      states.jpg

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                      P 1 Reply Last reply Reply Quote 0
                      • P Offline
                        pomegranatesculpordwarffargo @johnpoz
                        last edited by

                        @johnpoz Hi again, sorry had to step away for a bit.
                        Makes a lot of sense that that pfsense is not seeing the syn.
                        I can see a few successfuly states like yours:
                        10.0.101.20:51007 -> 10.0.100.30:443 ESTABLISHED:ESTABLISHED

                        But they're for port 443 which should be the NAS.

                        No port 8080 for gotify.

                        I'm with you that I don't think its the states. Seem like you say pfsense isn't even seeing the syn.
                        What sniff program do you recomend using?

                        johnpozJ 2 Replies Last reply Reply Quote 0
                        • johnpozJ Offline
                          johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
                          last edited by

                          @pomegranatesculpordwarffargo on your client wireshark works just fine.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ Offline
                            johnpoz LAYER 8 Global Moderator @pomegranatesculpordwarffargo
                            last edited by

                            @pomegranatesculpordwarffargo said in TCP:SA Block and Default Deny Rule 1000000103:

                            10.0.101.20:51007 -> 10.0.100.30:443 ESTABLISHED:ESTABLISHED

                            So you see it sending to pfsense to 10.0.30.443 for, which is your nas - but not for the vm on the same IP on port 8080?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.