• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Problem with RDP, SSH, VNC, anything requiring constant connection.

Scheduled Pinned Locked Moved 1.2.3-PRERELEASE-TESTING snapshots - RETIRED
6 Posts 3 Posters 6.7k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    john.grange
    last edited by Feb 18, 2009, 8:56 PM

    I upgraded to 1.2.3 in hopes that it would solve the problem I am having with RDP, SSH, VNC, or any traffic requiring constant connection. Pings, web traffic, etc all work fine.

    I also traced the problem down to the firewall rules, either disabling the PF (in advanced configuration) or clearing the firewall rules from the command line fix the problem, this obviously defeats the purpose of a firewall !

    I have noticed that the traffic shows up in the firewall log as blocked by default deny rule, even though I have allow all on ALL interfaces.

    This is not a latency issue as noted in another forum post somewhere this is LAN to LAN traffic across different subnet(s) AND OR vpn tunnels on a different router.

    Again this is present even across two different nic cards on the same firewall.

    This was present in 1.2.2.

    Bellow is a diagram of our network :

    Firewall03 Is a single firewall at the moment but will look similar to the external firewall setup after this issue has been resolved. The external firewall(s) are setup with CARP, and Failover only, no load balancing is being used. Again this issue is present on both the internal and external firewall setups, all were upgraded to 1.2.3 last night, but the problem was all present in 1.2.2. And again the issue is present even strictly on the internal firewall going from the 10.26.0.0 subnet to the 172.27.2.0 subnet.

    –---------------------------------------

    10.26.0.0/23                                                                                                                    WAN1                              WAN2
                                    ^                                                                                                                                ^                                    ^
      10.26.2.0/23  <firewall03>192.168.120.0/24 ->----------------------------------192.168.120.76--<firewall01>------pfSync------  <firewall02>^                                                                                                          192.168.120.74                          192.168.120.75
                            172.27.2.0/23</firewall02></firewall01></firewall03>

    1 Reply Last reply Reply Quote 0
    • C
      cmb
      last edited by Feb 19, 2009, 2:51 AM

      Sounds like you have asymmetric routing or something of that nature that's messing with state keeping. Allow all is really only allow all with flags S/SA plus anything in the state table. So you're seeing out of state traffic for some reason.

      1 Reply Last reply Reply Quote 0
      • J
        john.grange
        last edited by Feb 19, 2009, 4:58 AM Feb 19, 2009, 4:52 AM

        @cmb:

        Sounds like you have asymmetric routing or something of that nature that's messing with state keeping. Allow all is really only allow all with flags S/SA plus anything in the state table. So you're seeing out of state traffic for some reason.

        Ok, can you explain how that might happen, and how I might be able to track down what would be causing this? Again, like other users I did not have this problem before 1.2.2.

        [EDIT]

        Ok I did some research and in some cases yes it might be due to the asymmetric routing, does that mean if I have a route through a VPN server that does not have the firewall as the gateway I can not do any packet filtering?

        1 Reply Last reply Reply Quote 0
        • D
          dilidolo
          last edited by Feb 21, 2009, 12:44 AM

          I'm having the same issue. :( :( :(

          1 Reply Last reply Reply Quote 0
          • C
            cmb
            last edited by Feb 21, 2009, 10:31 PM

            @john.grange:

            Ok I did some research and in some cases yes it might be due to the asymmetric routing, does that mean if I have a route through a VPN server that does not have the firewall as the gateway I can not do any packet filtering?

            Not for those networks. Check "Bypass firewall rules for traffic on the same interface " under System -> Advanced.

            1 Reply Last reply Reply Quote 0
            • D
              dilidolo
              last edited by Feb 23, 2009, 6:10 PM

              @cmb:

              @john.grange:

              Ok I did some research and in some cases yes it might be due to the asymmetric routing, does that mean if I have a route through a VPN server that does not have the firewall as the gateway I can not do any packet filtering?

              Not for those networks. Check "Bypass firewall rules for traffic on the same interface " under System -> Advanced.

              I have this selected but still same issue.

              Thanks

              1 Reply Last reply Reply Quote 0
              2 out of 6
              • First post
                2/6
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                This community forum collects and processes your personal information.
                consent.not_received