Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HAProxy Port Redirect Internal

    Scheduled Pinned Locked Moved Cache/Proxy
    28 Posts 3 Posters 324 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      spiker
      last edited by

      555053eb-ecf9-4461-aa5b-5b132472f40a-image.png

      3588bf5b-9e25-46df-a736-6de25951a311-image.png

      1 Reply Last reply Reply Quote 0
      • S Offline
        spiker
        last edited by spiker

        So I turned off SSL offloading. Since the acme/letsencrypt cert I made earlier is now being used by webConfiguator. I figured the two acme/letsencrypt and self signed certs may be clashing???

        Basically I am now just trying to use HAproxy as a port redirect. Again my webConfiguator is set to listen on port 443 and backend on 10443. I thought this was baked into the whole front end listening on 443 and the backend set for 10443.

        This is being done entirely inside of my own LAN. Later I want to try SSL offload and front end listen on 443 then backend on 80 for my blueiris security cam web server that can not do SSL.

        1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann @spiker
          last edited by

          @spiker said in HAProxy Port Redirect Internal:

          I have the acme certs working just fine through HAProxy but I have to manually put in the destination port, in my case 10443. I have the front end set up to listen on the network in question and on port 443, and the backend set for 10443.

          What do you get exactly if you access port 443?

          A 1 Reply Last reply Reply Quote 0
          • A Offline
            andrew_cb @viragomann
            last edited by

            @viragomann What does the HAProxy Stats page show for the PFsense_FWL backend? It will show if the backend is up or down, and what the error is. Hover your mouse cursor over the backend and confirm that it shows 10.10.0.1:10443.

            1 Reply Last reply Reply Quote 0
            • A Offline
              andrew_cb
              last edited by

              Another test you can do is create a new frontend on a different listening port, set no ACL or actions, and then set the Default backend to PFsense_FWL. Then try accessing the new frontend. This will rule out any issues with your ACL matching.

              1 Reply Last reply Reply Quote 0
              • S Offline
                spiker
                last edited by

                34e31a99-557f-473a-9dd7-33da3a40a9f2-image.png

                1 Reply Last reply Reply Quote 0
                • S Offline
                  spiker
                  last edited by

                  e5bd04c5-f3d2-4b2e-95f6-0aac320116ba-image.png

                  A V 2 Replies Last reply Reply Quote 0
                  • S Offline
                    spiker
                    last edited by

                    The SSL cert works fine when I navigate directly to the web interface on the configured port 10443.

                    03bf8b25-fd7a-4ed0-92a4-374d5f14ded6-image.png

                    1 Reply Last reply Reply Quote 0
                    • A Offline
                      andrew_cb @spiker
                      last edited by

                      @spiker Can you access your firewall by going directly to https://10.10.0.1:10433 ?
                      If you change the health check for the backend to HTTP, does it still show as UP?

                      Also, try adding load-server-state-from-file none to the Advanced Settings > Backend pass thru section of each backend, as by default HAProxy will save the backend server state, and any changes will not take effect.

                      S 1 Reply Last reply Reply Quote 0
                      • S Offline
                        spiker @andrew_cb
                        last edited by

                        @andrew_cb

                        I can directly access the FWL from https://10.10.0.1:10443

                        let me change the health check and take a look.

                        1 Reply Last reply Reply Quote 0
                        • S Offline
                          spiker
                          last edited by spiker

                          Ok change the backend health check from Basic to HTTP and also checked SSL checks per the notes in the health check method field. It looks down now

                          796b9fb0-a48d-41f7-80a4-0a1587b8333a-image.png

                          f599b2f1-dc5b-42e3-996e-d3c5e96ba285-image.png

                          1 Reply Last reply Reply Quote 0
                          • V Offline
                            viragomann @spiker
                            last edited by

                            @spiker
                            Did you even add the proper certificate to the frontend?

                            S 1 Reply Last reply Reply Quote 0
                            • S Offline
                              spiker @viragomann
                              last edited by

                              @viragomann

                              So I turned off SSL Offloading, but yes I have a proper cert on the front end.

                              Really I an misusing haproxy here by just trying to get it to port redirect for one of my networks from 443 to 10443.

                              V A 2 Replies Last reply Reply Quote 0
                              • V Offline
                                viragomann @spiker
                                last edited by

                                @spiker
                                If you turn off SSL offloading, you cannot access HAproxy using https. So the error in the browser, you shown above is plausible.

                                S 1 Reply Last reply Reply Quote 0
                                • A Offline
                                  andrew_cb @spiker
                                  last edited by

                                  @spiker Mouse over L7STS/405 and see what it says.

                                  I am doing the same thing that you are trying, and it works for me.
                                  I do see that my Http check method is set to GET instead of OPTIONS, so try that and see if that fixes the health check status.

                                  S 1 Reply Last reply Reply Quote 0
                                  • S Offline
                                    spiker @viragomann
                                    last edited by spiker

                                    @viragomann

                                    Ok turned SSL offloading back on, and selected the valid cert I set up with Acme/letsencrypt.

                                    I set the new front end to listen on 2443 and killed all the ACL's and set the default backend to PFsense_FWL

                                    did not blur out my domain but I do not plan on opening any services from WAN anyway.

                                    cc7a130b-f3b2-4d3a-8214-8fb33749138c-image.png

                                    9533fc1d-1cca-44ab-9668-d7977017ecce-image.png

                                    7b5810e6-d60c-41a6-b58e-e9cf08be2df4-image.png

                                    1 Reply Last reply Reply Quote 1
                                    • S Offline
                                      spiker @andrew_cb
                                      last edited by spiker

                                      @andrew_cb

                                      "I am doing the same thing that you are trying, and it works for me.
                                      I do see that my Http check method is set to GET instead of OPTIONS, so try that and see if that fixes the health check status."

                                      e8318ba0-8ceb-4850-8782-f99a83f9848c-image.png

                                      80bf0330-2a27-4a2d-ad1b-0cfb18bdc58e-image.png

                                      770af198-83c3-4357-8afd-881e808ebdaa-image.png

                                      V 1 Reply Last reply Reply Quote 1
                                      • V Offline
                                        viragomann @spiker
                                        last edited by viragomann

                                        @spiker
                                        This is the web UI directly accessed.

                                        What do you get without the port stated?

                                        Edit:
                                        Oh well, your frontend ist listening on port 2443 now.

                                        V S 2 Replies Last reply Reply Quote 0
                                        • V Offline
                                          viragomann @viragomann
                                          last edited by

                                          As the error message indicates, your web UI is forced to use https, but HAproxy uses http for accessing it.

                                          S 1 Reply Last reply Reply Quote 1
                                          • S Offline
                                            spiker @viragomann
                                            last edited by

                                            @viragomann

                                            Yeah directly accessed would be on port 10443, and that works just fine, cert and all.

                                            I do have a rule on all other interfaces/networks to block port 10443, but I am on the network that is stated in the front end and that interface has no rule to block 10443 to the FWL address.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.