Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Network Drops. There HAS TO be an easier way!

    Scheduled Pinned Locked Moved Firewalling
    11 Posts 5 Posters 651 Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      jcarmi04
      last edited by

      Posted this on another forum - sorry Internet for the dupe, but wondering if the community here has insight.

      Pfsense version 2.3.4-RELASE-p1 (i386)

      Xfinity Internet

      Motorola MB8611 DOCSIS 3.1 Multi-Gig Cable Modem

      NETGEAR JGS516PE-100NAS

      My wife and I work from home and I am getting debilitating network drops throughout my house multiple times per day. Like BAD. At first, I thought it was a WiFi issue, so I swapped from our Google product, and so on. Had a angry call with Comcast to get a new WAN IP, etc. Ugh!

      I have currently landed on the WAN interface and have a continuous PowerShell script capturing daily traffic. When I check it against my mess of a Pfsense System Log, I do a IP lookup of the inbound WAN interface and then create a firewall rule for the host (or sometimes single address). WTH!

      I think it is working, though. I am keeping my eye on it.

      We used to have an Arris Surfboard, or similar, modem and I do not think these issues were present. I also have not replaced end-to-end cabling.

      Any ideas or solutions?

      If not, is there a better way and workflow for me to get these "offenders" blocked?

      Thx thx thx!

      KOMK J 2 Replies Last reply Reply Quote 0
      • KOMK Offline
        KOM @jcarmi04
        last edited by

        @jcarmi04 said in Network Drops. There HAS TO be an easier way!:

        Pfsense version 2.3.4-RELASE-p1 (i386)

        pfSense 2.3.4 is 6.5 years old. You should update to current.

        I have currently landed on the WAN interface and have a continuous PowerShell script capturing daily traffic. When I check it against my mess of a Pfsense System Log, I do a IP lookup of the inbound WAN interface and then create a firewall rule for the host (or sometimes single address). WTH!

        I have no idea what you mean by this.

        If not, is there a better way and workflow for me to get these "offenders" blocked?

        What offenders, and why are you explicitly blocking them? WAN already blocks all unsolicited inbound traffic.

        J 1 Reply Last reply Reply Quote 1
        • J Offline
          Jarhead @jcarmi04
          last edited by

          @jcarmi04 What do you mean by offenders?
          Do you have ports open on your WAN for something?
          If not, all traffic is already blocked by default.

          Why haven't you updated pfSense?

          J 1 Reply Last reply Reply Quote 0
          • E Offline
            elvisimprsntr
            last edited by elvisimprsntr

            @jcarmi04

            1. Backup your pfSense config.
            2. Update to latest pfSense
            3. Run a Shields Up! scan on all service ports to determine what ports might be open.
            J 2 Replies Last reply Reply Quote 0
            • J Offline
              jcarmi04 @KOM
              last edited by jcarmi04

              Thanks for the note!

              @KOM said in Network Drops. There HAS TO be an easier way!:

              pfSense 2.3.4 is 6.5 years old. You should update to current.

              I may be bound by hardware specs or that I have not updated BIOS? Suggestions?

              System pfSense
              Serial: 1234567890
              Netgate Device ID: b4dfc5c16707f239151a
              BIOS Vendor: American Megatrends Inc.
              Version: 1.0c
              Release Date: 03/11/2009
              Version 2.3.4-RELEASE-p1 (i386)
              built on Fri Jul 14 14:53:03 CDT 2017
              FreeBSD 10.3-RELEASE-p19

              The system is on the latest version.
              Platform pfSense
              CPU Type Intel(R) Celeron(R) CPU E3300 @ 2.50GHz
              2 CPUs: 1 package(s) x 2 core(s)

              @KOM said in Network Drops. There HAS TO be an easier way!:

              I have no idea what you mean by this.

              Here is what I am doing to temporarily resolve these issues:

              1. PowerShell
                1.a. Start-Transcript -path C:/log.txt -Append
                1.b. Ping.exe -t google.com | ForEach {"{0} - {1}" -f (Get-Date),$_}
              2. Pfsense\Status\System Logs
                2.a. From the logs, I look for similar entries:
                1708521292|1|3|10|Probing or server down: <A HREF='/lua/host_details.lua?host=[IP-OMITTED-BUT-CAN-INCLUDE]&ifname=re1'>[IP-OMITTED-BUT-CAN-INCLUDE]</A> > <A HREF='/lua/host_details.lua?host=[IP-OMITTED]&ifname=re1'>c-[IP-OMITTED].hsd1.nh.comcast.net</A> [TCP [IP-OMITTED-BUT-CAN-INCLUDE]:50133 > [IP-OMITTED]:8807 [proto: 0/Unknown][1/0 pkts][60/0 bytes][SYN]]
                2.b. Confirm IP against an IP lookup site
              3. Pfsense\Firewal\Rules\WAN
                3.a. Block source or subnet
              1 Reply Last reply Reply Quote 0
              • M Offline
                michmoor LAYER 8 Rebel Alliance
                last edited by

                @KOM said in Network Drops. There HAS TO be an easier way!:

                ffend

                Im with everyone here. First update pfSense to a supported version. Lots of bug fixes and security fixes.
                If the problem is still there we can start some triage.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • J Offline
                  jcarmi04 @Jarhead
                  last edited by

                  @Jarhead said in Network Drops. There HAS TO be an easier way!:

                  Do you have ports open on your WAN for something?
                  If not, all traffic is already blocked by default.

                  I only have 32400 open for Plex. Everything else should be blocked by default, but, by blocking these individual inbound attempts, it has allowed my network to remain up. Without these being blocked, my network throttles - to the point of being unusable - multiple times throughout the day.

                  E 1 Reply Last reply Reply Quote 0
                  • J Offline
                    jcarmi04 @elvisimprsntr
                    last edited by

                    @elvisimprsntr said in Network Drops. There HAS TO be an easier way!:

                    Update to latest pfSense

                    @michmoor said in Network Drops. There HAS TO be an easier way!:

                    Im with everyone here. First update pfSense to a supported version. Lots of bug fixes and security fixes.
                    If the problem is still there we can start some triage.

                    Thanks, all! Here is what I have from the system:

                    SystemUpdateSystem Update
                    System Update
                    Update Settings
                    Confirmation Required to update pfSense system.
                    Current Base System2.3.4_1
                    Latest Base System2.3.4_1
                    StatusUp to date.

                    E 1 Reply Last reply Reply Quote 0
                    • E Offline
                      elvisimprsntr @jcarmi04
                      last edited by elvisimprsntr

                      @jcarmi04

                      Many reports of people getting compromised running Plex with open ports. Not to mention security breaches by Plex themselves.

                      https://www.theverge.com/2022/8/24/23319570/plex-security-breach-exposes-usernames-emails-passwords

                      A better solution is to host your own VPN service on pfSense (IPSec, OpenVPN, Wireguard, Tailscale, etc.)

                      1 Reply Last reply Reply Quote 0
                      • E Offline
                        elvisimprsntr @jcarmi04
                        last edited by elvisimprsntr

                        @jcarmi04

                        Netgate dropped support for 32-bit, but your CPU is 64-bit. Since 2.3.4_1 is so old, you might be better off installing from scratch and restoring your config. Also, you might want to upgrade your appliance to something with more performance. Might be a less disruptive migration path to buy new appliance, install from scratch, restore config, then swap out appliance. Also, gives you the benefit of upgrading to more robust ZFS file system.

                        Need to select latest branch under Update Settings.

                        Make sure to backup your config first and download the latest version and put on a USB stick just in case you have to re-install from scratch.

                        Screenshot 2024-02-22 at 10.33.34 AM.png

                        1 Reply Last reply Reply Quote 0
                        • J Offline
                          jcarmi04 @elvisimprsntr
                          last edited by

                          @elvisimprsntr said in Network Drops. There HAS TO be an easier way!:

                          un a Shields Up! scan on all service ports to determine what ports might be open.

                          Cool site - thanks! I passed (with no Common or Service Ports open), but will store this for future testing needs :)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.