Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense on Proxmox with questionable connectivity (Port Forwarding)

    Scheduled Pinned Locked Moved Virtualization
    17 Posts 4 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      whytf @NollipfSense
      last edited by whytf

      @NollipfSense

      Sorry for not being specific with my setup, I use i340-t4 for both ISPs, one port for LAN and proxmox management was used by a motherboard NIC
      1.png 2.png 3.png 4.png
      OPT1 is basically vtnet2 but it's pppoe so it's a new interface
      All of these ports are physically connected to a switch with a NAS and rest of the LAN, but that wouldn't explain why port forwarding doesn't work

      NollipfSenseN 1 Reply Last reply Reply Quote 0
      • NollipfSenseN
        NollipfSense @whytf
        last edited by

        @whytf said in pfSense on Proxmox with questionable connectivity (Port Forwarding):

        my setup, I use i340-t4 for both ISPs, one port for LAN and proxmox management was used by a motherboard NIC

        Okay, you're on the right track then...carry on. I saw some had problems getting the dual WAN to work...did you look at any of the threads on Proxmox forum?

        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

        W 1 Reply Last reply Reply Quote 0
        • W
          whytf @NollipfSense
          last edited by

          @NollipfSense yep i did look, however no issues related to "only port forward not working" while other connectivity 100% working

          1 Reply Last reply Reply Quote 0
          • V
            viragomann @whytf
            last edited by

            @whytf said in pfSense on Proxmox with questionable connectivity (Port Forwarding):

            Port forwarding is setup the usual way for load balanced WANs, interface Gateway Group, source any

            Which one interface group or gateway group?
            To be honest, I don't know any option to state a gateway group in port forwarding, and interface group would not be the correct way to do it.

            W 1 Reply Last reply Reply Quote 0
            • W
              whytf @viragomann
              last edited by

              @viragomann I have been running gateway group as NAT interface for some time now without any issues, I made sure to retest my setup using NAT interface as either one ISP or other but still with same issue.

              group.png nat.png

              D V 2 Replies Last reply Reply Quote 0
              • D
                darcey @whytf
                last edited by

                @whytf I am not suggesting it as a fix, but what happens if you change destination to 'any' in the forward rule?

                W 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @whytf
                  last edited by

                  @whytf
                  As mentioned, port forwarding on an interface group is the wrong way to do it.

                  However, it's not on the NAT rule, in fact it's the firewall rule, which has to be defined on each unique interface separately.

                  This means, you could also leave the NAT rule on the group, but have disable the filter rule association and create the rule manually on each interface.
                  Or just define the port forwardings with associated filter rules on each interface separately.

                  At all events, there must no pass rule on an interface group or a floating pass rule match to the forwarded traffic!

                  1 Reply Last reply Reply Quote 1
                  • W
                    whytf @darcey
                    last edited by

                    @darcey said

                    @whytf I am not suggesting it as a fix, but what happens if you change destination to 'any' in the forward rule?

                    So I tried setting it to any when using interface group and separately but nothing changed, nothing unusual in system logs as well.

                    @viragomann said

                    @whytf
                    As mentioned, port forwarding on an interface group is the wrong way to do it.

                    However, it's not on the NAT rule, in fact it's the firewall rule, which has to be defined on each unique interface separately.

                    This means, you could also leave the NAT rule on the group, but have disable the filter rule association and create the rule manually on each interface.
                    Or just define the port forwardings with associated filter rules on each interface separately.

                    At all events, there must no pass rule on an interface group or a floating pass rule match to the forwarded traffic!

                    It's really interesting that this solved port forwarding for pppoe ISP1 but the dhcp ISP2 port forwarding still doesn't work at all, some time ago I have confirmed with ISP2 on their part that they use 1:1 NAT, however I can't think of anything that could affect this just by using linux bridges, which is just a switch. Hmm any ideas?

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @whytf
                      last edited by

                      @whytf said in pfSense on Proxmox with questionable connectivity (Port Forwarding):

                      but the dhcp ISP2 port forwarding still doesn't work at all,

                      And you say, it worked if you pass through the NIC?
                      So why don't you do it? Seems you have enough.

                      I don't think, that it has something to do with the virtual bridges, at least as long as Proxmox has no IP in these subnets.

                      W 1 Reply Last reply Reply Quote 0
                      • W
                        whytf @viragomann
                        last edited by whytf

                        @viragomann said in pfSense on Proxmox with questionable connectivity (Port Forwarding):

                        And you say, it worked if you pass through the NIC?
                        So why don't you do it? Seems you have enough.

                        Yes the passthrough works, however I am quite limited by CPU and RAM, which could be solved by using linux drivers, average latency is around 50% lower too, only problem is with that one dhcp ISP

                        Also I intended to have higher throughput for my VMs running on the "router", if I remember correctly I hit around 21Gb/s when using virtIO between VMs, I was planning to create a bond between the "router" and NAS, both are connected to a switch with enough free ports, but first I need to get it to work properly before experimenting with bonds and such.

                        I don't think, that it has something to do with the virtual bridges, at least as long as Proxmox has no IP in these subnets.

                        Yep, proxmox has IP in LAN subnet, only difference between passing through and having virtual NIC is just kernel, driver and one extra hop as it is in virtual switch, worked with pppoe without issues so I doubt it could be kernel or driver and extra hop isn't that bad to cause something like this.

                        V 1 Reply Last reply Reply Quote 0
                        • V
                          viragomann @whytf
                          last edited by

                          @whytf
                          Did you disable the hardware checksum offloading?

                          W 1 Reply Last reply Reply Quote 0
                          • W
                            whytf @viragomann
                            last edited by whytf

                            @viragomann said in pfSense on Proxmox with questionable connectivity (Port Forwarding):

                            @whytf
                            Did you disable the hardware checksum offloading?

                            Yes I have disabled it in pfsenseoffload.png

                            As for proxmox ethtool -K enp1s0f0 rx off tx off, ethtool -K vmbr1 rx off tx off

                            V 1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @whytf
                              last edited by

                              @whytf
                              All right.

                              1 Reply Last reply Reply Quote 0
                              • W
                                whytf
                                last edited by

                                Bump

                                W 1 Reply Last reply Reply Quote 0
                                • W
                                  whytf @whytf
                                  last edited by whytf

                                  For future reference I made a summarized the all the information possibly required:

                                  My setup:

                                  • Proxmox version: 8.1.4
                                  • pfSense version: 2.7.2
                                  • NIC: i340-t4, i219 (motherboard)
                                  • Network configuration:
                                  • vmbr0 is assigned to LAN in pfsense and all other VMs in proxmox, it also has slaved physical port (i340-t4) that connects to rest of the lan
                                  • vmbr1 is assigned to WAN in pfsense and it has slaved physical port (i340-t4) to ISP1(DHCP)
                                  • vmbr2 is assigned to WAN2 in pfsense and it has slaved physical port (i340-t4) to ISP2(PPPoE)
                                  • vmbr4 is assigned for proxmox management/cluster only and it has slaved physical port (i219) that connects to same physical switch as vmbr0/rest of the lan

                                  The issue:

                                  • Port forwarding works when using NIC passthrough, but not when using virtIO
                                  • Specifically, port forwarding doesn't work for the DHCP ISP connection when using virtIO, but does work with PPPoE ISP2

                                  I have tried:

                                  • disable hardware offloading in pfsense
                                  • ethtool -K XXXX rx off tx off for physical ports as well as vmbr(0-4) on proxmox
                                  • manually changing MAC Addresses on vmbr(0-4) in case there would be a conflict, especially vmbr1 having same MAC as the physical interface
                                  • This is my /etc/network/interfaces with manual MAC Addresses, to test without that I just comment out the vmbr hwaddress lines:
                                  auto lo
                                  iface lo inet loopback
                                  
                                  auto enp1s0f2
                                  iface enp1s0f2 inet manual
                                  
                                  iface enp1s0f3 inet manual
                                  
                                  iface enp1s0f0 inet manual
                                          hwaddress XXXXXXXXXX
                                  
                                  iface enp1s0f1 inet manual
                                  
                                  iface eno1 inet manual
                                  
                                  auto vmbr0
                                  iface vmbr0 inet manual
                                          bridge-ports enp1s0f3
                                          bridge-stp off
                                          bridge-fd 0
                                          hwaddress 90:e2:ba:37:0d:a0
                                  #LAN
                                  
                                  auto vmbr1
                                  iface vmbr1 inet manual
                                          bridge-ports enp1s0f0
                                          bridge-stp off
                                          bridge-fd 0
                                          hwaddress 90:e2:ba:37:0d:a1
                                  #Antik
                                  
                                  auto vmbr2
                                  iface vmbr2 inet manual
                                          bridge-ports enp1s0f1
                                          bridge-stp off
                                          bridge-fd 0
                                          hwaddress 90:e2:ba:37:0d:a2
                                  #Telekom
                                  
                                  auto vmbr4
                                  iface vmbr4 inet static
                                          address 192.168.0.70/16
                                          gateway 192.168.0.1
                                          bridge-ports eno1
                                          bridge-stp off
                                          bridge-fd 0
                                          hwaddress 50:65:f3:48:34:a4
                                  #PVE
                                  
                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.