Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Connected successfully to a Sonicwall TZ170 but…

    IPsec
    6
    25
    28.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sullrich
      last edited by

      I'm still curious why I never need to do this.  I connect to any machine across the pfSense tunnel and connect to RDP, etc.

      Why is it different in this case?

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        @sullrich:

        I'm still curious why I never need to do this.  I connect to any machine across the pfSense tunnel and connect to RDP, etc.

        Why is it different in this case?

        That's one I've never figured out.  :D  I've also successfully run RDP and about everything else over VPN tunnels using m0n0wall and pfsense.  Client side group policy processing is the only issue I can easily replicate, because it sends a 2000 byte ping to determine link speed for GPO processing purposes.  Because this never gets a reply, the machine aborts group policy processing.  You can disable this pretty stupid means of link speed testing via group policy (though it's kinda hard to apply a fix through group policy to machines that can't apply group policies ;) ) or a registry change.

        But it's easy to see and replicate the problem.  Do a "ping -l 1400 10.x.x.x" to something across the tunnel, and it'll work.  Increase it to 1470 or something like that, and it won't.  You should be able to ping our servers at BGN with any size packet you want (it'll frag, so only if you allow frags out your LAN).  The same won't work over VPN once you get over 1460 or so (though I've also seen oddities where it worked up into the 1460's before the packets started disappearing, which is another oddity).

        1 Reply Last reply Reply Quote 0
        • H
          HaloGray
          last edited by

          @cmb:

          this is a major limitation, with no easy work around at this time unfortunately.  If it becomes a major issue, the best "solution" at this time is to lower the MTU of your systems to 1460.  That can have some negative impact on host to host network throughput on the LAN though (more packets have to be processed to transfer the same amount of data, which chews up more system resources)

          I knocked my wan down to 1472 and had no difference, I'll try going as far as 1460 and see what happens.  The extra resources shouldn't be that much of an issue.  The networks I'm talking about have less than 10 users each.

          @sullrich:

          I'm still curious why I never need to do this.  I connect to any machine across the pfSense tunnel and connect to RDP, etc.

          Why is it different in this case?

          Perhaps it's something to do with the networks?

          The pfSense box is located in my home where I'm playing around with it.  I'm connecting across a SBC Yahoo 1.5mb ADSL wan link (with dynamic IP) to a static Comcast cable 5mb WAN link (static IP).

          My home connection is looking for an IP, and the remote connection is looking for my dyndns address (The TZ170 is capable of doing this, unlike the SoHo provided in m0n0wall's example).  My identifyer is my IP, and the sonicwall's identifyer is the unit's serial number.

          Have you had a setup similar to this and had it work ok?

          1 Reply Last reply Reply Quote 0
          • S
            sullrich
            last edited by

            I must have a magic pfSense:

            C:\Documents and Settings\GeekGod.SULLRICH>ping -l 3000 10.0.0.26

            Pinging 10.0.0.26 with 3000 bytes of data:

            Reply from 10.0.0.26: bytes=3000 time=188ms TTL=63
            Reply from 10.0.0.26: bytes=3000 time=208ms TTL=63

            :) :)

            1 Reply Last reply Reply Quote 0
            • H
              HaloGray
              last edited by

              @cmb:

              But it's easy to see and replicate the problem.  Do a "ping -l 1400 10.x.x.x" to something across the tunnel, and it'll work.  Increase it to 1470 or something like that, and it won't.  You should be able to ping our servers at BGN with any size packet you want (it'll frag, so only if you allow frags out your LAN).  The same won't work over VPN once you get over 1460 or so (though I've also seen oddities where it worked up into the 1460's before the packets started disappearing, which is another oddity).

              C:\WINDOWS|► ping  -l 1472 10.50.1.4

              Pinging 10.50.1.4 with 1472 bytes of data:

              Reply from 10.50.1.4: bytes=1472 time=88ms TTL=127
              Reply from 10.50.1.4: bytes=1472 time=91ms TTL=127

              Seems to work ok?  That's what my WAN MTU is set up at… yet I still get the black screen unless I disable bitmap caching.  Am I not understanding properly?

              1 Reply Last reply Reply Quote 0
              • C
                cmb
                last edited by

                @sullrich:

                I must have a magic pfSense:

                C:\Documents and Settings\GeekGod.SULLRICH>ping -l 3000 10.0.0.26

                Pinging 10.0.0.26 with 3000 bytes of data:

                Reply from 10.0.0.26: bytes=3000 time=188ms TTL=63
                Reply from 10.0.0.26: bytes=3000 time=208ms TTL=63

                :) :)

                what the…

                goes off to check FreeBSD 6 and hope to be proven wrong.  ;D

                i haven't done any extensive testing of this since 4.x and 5.x versions, though I doubt if it's changed.

                1 Reply Last reply Reply Quote 0
                • S
                  sullrich
                  last edited by

                  @HaloGray:

                  @cmb:

                  But it's easy to see and replicate the problem.  Do a "ping -l 1400 10.x.x.x" to something across the tunnel, and it'll work.  Increase it to 1470 or something like that, and it won't.  You should be able to ping our servers at BGN with any size packet you want (it'll frag, so only if you allow frags out your LAN).  The same won't work over VPN once you get over 1460 or so (though I've also seen oddities where it worked up into the 1460's before the packets started disappearing, which is another oddity).

                  C:\WINDOWS|► ping  -l 1472 10.50.1.4

                  Pinging 10.50.1.4 with 1472 bytes of data:

                  Reply from 10.50.1.4: bytes=1472 time=88ms TTL=127
                  Reply from 10.50.1.4: bytes=1472 time=91ms TTL=127

                  Seems to work ok?  That's what my WAN MTU is set up at… yet I still get the black screen unless I disable bitmap caching.  Am I not understanding properly?

                  Does a -l 1500 work by chance?  How about -l 3000 ?

                  Just curious as I think there is something else at play here.

                  1 Reply Last reply Reply Quote 0
                  • S
                    sullrich
                    last edited by

                    @cmb:

                    @sullrich:

                    I must have a magic pfSense:

                    C:\Documents and Settings\GeekGod.SULLRICH>ping -l 3000 10.0.0.26

                    Pinging 10.0.0.26 with 3000 bytes of data:

                    Reply from 10.0.0.26: bytes=3000 time=188ms TTL=63
                    Reply from 10.0.0.26: bytes=3000 time=208ms TTL=63

                    :) :)

                    what the…

                    goes off to check FreeBSD 6 and hope to be proven wrong.  ;D

                    i haven't done any extensive testing of this since 4.x and 5.x versions, though I doubt if it's changed.

                    SHRUGS.  I'm not sure what's going on here but it seems that this is no longer a problem (MTU path discovery)

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      @cmb:

                      though I doubt if it's changed.

                      i guess i should say "it sure looks like it's changed", because that never would have worked before.

                      1 Reply Last reply Reply Quote 0
                      • H
                        HaloGray
                        last edited by

                        It seems to be a problem with the command given ;)

                        C:\WINDOWS|► ping  -l 3000 10.50.1.4

                        Pinging 10.50.1.4 with 3000 bytes of data:

                        Reply from 10.50.1.4: bytes=3000 time=147ms TTL=127
                        Reply from 10.50.1.4: bytes=3000 time=168ms TTL=127

                        Works fine for me too, but when I set the -f option (do not fragment) it fails.

                        C:\WINDOWS|► ping  -f -l 3000 10.50.1.4

                        Pinging 10.50.1.4 with 3000 bytes of data:

                        Packet needs to be fragmented but DF set.

                        However… even with the -f option set 1472 still succeeds...

                        C:\WINDOWS|► ping  -f -l 1472 10.50.1.4

                        Pinging 10.50.1.4 with 1472 bytes of data:

                        Reply from 10.50.1.4: bytes=1472 time=83ms TTL=127
                        Reply from 10.50.1.4: bytes=1472 time=127ms TTL=127

                        :edit:

                        Perhaps it has something to do with the 20 bytes of overhead you mentioned?

                        C:\WINDOWS|► ping -f -l 1492 10.50.1.4

                        Pinging 10.50.1.4 with 1492 bytes of data:

                        Packet needs to be fragmented but DF set.

                        1 Reply Last reply Reply Quote 0
                        • S
                          sullrich
                          last edited by

                          Do you have anything in the event viewer that pertains to this?

                          1 Reply Last reply Reply Quote 0
                          • C
                            cmb
                            last edited by

                            @HaloGray:

                            Works fine for me too, but when I set the -f option (do not fragment) it fails.

                            when you set -f with anything over your MTU on a ping on Windows, it never leaves the NIC of the box (I've verified this with tcpdump on another host).  Windows realizes "hey, I can't send this without fragmenting", and should give you "Packet needs to be fragmented but DF set." without the packet ever touching the network.

                            this is indeed not an issue any more with pings.

                            from my house to Scott's (this is even with m0n0wall on my end, a little strange that this now works…):

                            root@s2# ping -s 3000 10.0.250.1
                            PING 10.0.250.1 (10.0.250.1): 3000 data bytes
                            3008 bytes from 10.0.250.1: icmp_seq=0 ttl=63 time=236.648 ms
                            3008 bytes from 10.0.250.1: icmp_seq=1 ttl=63 time=241.168 ms
                            3008 bytes from 10.0.250.1: icmp_seq=2 ttl=63 time=229.937 ms

                            But ping is actually a different issue - that was FreeBSD b0rking somewhere on fragmented packets (I guess on the receiving end, based upon the above result).

                            But with stuff like this still happening regularly with things like RDP, TCP definitely still seems to be an issue.  Off to see what I can figure out with that.

                            It really shouldn't frag any TCP like it does with ICMP as we've exhibited here, because on any host OS with PMTUD enabled, the DF bit will always be set on packets.  You don't want any of your network devices frag'ing DF packets, and always want to completely avoid frags if at all possible.

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by

                              @sullrich:

                              SHRUGS.  I'm not sure what's going on here but it seems that this is no longer a problem (MTU path discovery)

                              you can't test that with ping, as when using a -f and packet larger than MTU, it never leaves the box (with Windows at least, can't say that I've tried any other OS).  So this test doesn't tell us that the problem is resolved at all.  it just shows us a somewhat related other stupid issue with IPsec isn't a problem anymore.  I was thinking maybe there would be a way to use ping in another regard to further test this, but that doesn't seem to be the case either because of Windows stupidity.

                              1 Reply Last reply Reply Quote 0
                              • H
                                HaloGray
                                last edited by

                                @sullrich:

                                Do you have anything in the event viewer that pertains to this?

                                I just tried connecting without bitmap caching and have an error generated about a missing printer driver (unrelated but it's sort of a place holder).
                                Turned on bitmap caching and tried to re-connect.  > Black screen again.
                                Disabled bitmap caching and re-connected successfully again to find the printer error repeat, with nothing inbetween the two events.

                                So the short answer here is… no.

                                Regarding Windows and ping being a poor test, I have a linux box in the house and I could get to the shell on my pfsense box itself to run some ping tests.  That is if you would find it helpful to do so.

                                1 Reply Last reply Reply Quote 0
                                • C
                                  cmb
                                  last edited by

                                  My Windows box is being dumb - can either/both of you try this and see what you get?

                                  I was thinking, I should be able to send a ping packet at 1499 bytes (or something like that) with DF, and it should hit the network.  It doesn't.  I can't even send a 1300 byte ping with DF.

                                  try a
                                  ping -l 1300 -f 10.x.x.x

                                  to something on your LAN and see what you get.

                                  1 Reply Last reply Reply Quote 0
                                  • H
                                    HaloGray
                                    last edited by

                                    From windows it works fine:
                                    C:\WINDOWS|► ping -l 1300 -f 192.168.0.1

                                    Pinging 192.168.0.1 with 1300 bytes of data:

                                    Reply from 192.168.0.1: bytes=1300 time<1ms TTL=64

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      sullrich
                                      last edited by

                                      Microsoft Windows [Version 5.2.3790]
                                      (C) Copyright 1985-2003 Microsoft Corp.

                                      C:\Documents and Settings\GeekGod.SULLRICH>ping -l 1300 -f 10.0.0.26

                                      Pinging 10.0.0.26 with 1300 bytes of data:

                                      Reply from 10.0.0.26: bytes=1300 time=82ms TTL=63
                                      Reply from 10.0.0.26: bytes=1300 time=82ms TTL=63

                                      1 Reply Last reply Reply Quote 0
                                      • B
                                        billm
                                        last edited by

                                        @cmb:

                                        @sullrich:

                                        I'm still curious why I never need to do this.  I connect to any machine across the pfSense tunnel and connect to RDP, etc.

                                        Why is it different in this case?

                                        That's one I've never figured out.  :D  I've also successfully run RDP and about everything else over VPN tunnels using m0n0wall and pfsense.  Client side group policy processing is the only issue I can easily replicate, because it sends a 2000 byte ping to determine link speed for GPO processing purposes.  Because this never gets a reply, the machine aborts group policy processing.  You can disable this pretty stupid means of link speed testing via group policy (though it's kinda hard to apply a fix through group policy to machines that can't apply group policies ;) ) or a registry change.

                                        But it's easy to see and replicate the problem.  Do a "ping -l 1400 10.x.x.x" to something across the tunnel, and it'll work.  Increase it to 1470 or something like that, and it won't.  You should be able to ping our servers at BGN with any size packet you want (it'll frag, so only if you allow frags out your LAN).  The same won't work over VPN once you get over 1460 or so (though I've also seen oddities where it worked up into the 1460's before the packets started disappearing, which is another oddity).

                                        Works for me?

                                        ping -s 1600 192.168.177.254

                                        PING 192.168.177.254 (192.168.177.254): 1600 data bytes
                                        1608 bytes from 192.168.177.254: icmp_seq=0 ttl=63 time=61.553 ms
                                        1608 bytes from 192.168.177.254: icmp_seq=1 ttl=63 time=31.591 ms
                                        1608 bytes from 192.168.177.254: icmp_seq=2 ttl=63 time=33.823 ms

                                        –Bill

                                        pfSense core developer
                                        blog - http://www.ucsecurity.com/
                                        twitter - billmarquette

                                        1 Reply Last reply Reply Quote 0
                                        • L
                                          lsf
                                          last edited by

                                          CMB you are correct about assuming that you should be able to send 1499 (1500 actually) while the DF bit is set. Most likely you have run some internet tuning software or somthing that has been playing with some TCP settings. Because you should indeed be able to ping -f -s 1492 host.to.ping (should become 1500 bytes when you add the 8 byte overhead) so you should receive a 1500byte ping reply.
                                          Sidenote: IIRC there was some PMTU discovery fix on FBSD not long ago. (last week or this week).

                                          -lsf

                                          1 Reply Last reply Reply Quote 0
                                          • H
                                            HaloGray
                                            last edited by

                                            I went over to my linux box and pinged a host on the lan and then vpn.

                                            $ ping -s 1492 192.168.0.3
                                            PING 192.168.0.3 (192.168.0.3) 1492(1520) bytes of data.
                                            1500 bytes from 192.168.0.3: icmp_seq=1 ttl=128 time=6.54 ms
                                            1500 bytes from 192.168.0.3: icmp_seq=2 ttl=128 time=6.10 ms

                                            LAN connection works.

                                            $ ping -s 1492 10.50.1.1
                                            PING 10.50.1.1 (10.50.1.1) 1492(1520) bytes of data.

                                            –- 10.50.1.1 ping statistics ---
                                            3 packets transmitted, 0 received, 100% packet loss, time 1998ms

                                            VPN does not.  The MTU on my pfSense WAN connection is actually set at 1472, and pinging over the VPN from here succeeds at that level... so I'm confused.  Any thoughts?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.