Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Permitted traffic to LAN blocked silently

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 4 Posters 7.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GruensFroeschliG Offline
      GruensFroeschli
      last edited by

      Sure that should work.
      If your switch is able to mirror ports you could do that as well.
      I suggested the hub just because you might have one lying around and it's easier than configuring a switch to mirror a port.

      We do what we must, because we can.

      Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

      1 Reply Last reply Reply Quote 0
      • F Offline
        fr3ddie
        last edited by

        Understood. Unfortunately I have no hub and the switch is a stupid-cheap accesspoint from netgear that has no capability to mirror a port. So I'll try with my laptop.
        Thank you very much for your help :)

        1 Reply Last reply Reply Quote 0
        • C Offline
          cmb
          last edited by

          tcpdump from the firewall would be more useful. Start from the inside since the traffic is getting logged as passed.

          Can you telnet to port 110 on that host from the firewall?

          It certainly isn't a bug. Config looks fine at a glance.

          1 Reply Last reply Reply Quote 0
          • F Offline
            fr3ddie
            last edited by

            So, I've made all the tests I could.
            1. Used the "Diagnostic–->Packet Capture" on pfSense pointing to the LAN interface and on the port SSH use: nothing logged
            2. Attached my own laptop directly to the pfSense's LAN interface and tried an SSH session (from outside) with Wireshark sniffing: nothing logged
            3. Telnetted/SSHed to the LAN machine from the pfSense's shell and both the tests went fine: can connect
            4. Telnetted/SSHed to the LAN machine from the DMZ and both the tests went fine: can connect

            So it's defitively something in the process of passing packets from the port-forwarding-NAT/WAN-rules to the LAN interface, 'cause logs on pfSense shows the rules (NAT+WAN) have matched properly but nothing exits from the LAN interface. I remember the same port-forward to my DMZ works flawlessly (despite the protocol/port I use).

            And now what can I try? Any suggestion/request? :(

            1 Reply Last reply Reply Quote 0
            • P Offline
              Perry
              last edited by

              What a tcpdump on my Lan nic shows when i try from a outside connection

              tcpdump -t -i vr0 port 3333

              tcpdump: WARNING: vr0: no IPv4 address assigned
              tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
              listening on vr0, link-type EN10MB (Ethernet), capture size 96 bytes
              IP 0x4dd40e8e.<deleted>.42524 > 192.168.1.49.dec-notes: S 760313484:760313484(0) win 5840 <mss 6="" 4440200="" 1460,sackok,timestamp="" 0,nop,wscale="">what I could find in http://192.168.1.1/status.php

              #pfctl -sn
              rdr on vlan0 inet proto tcp from any to <my wan="" ip="">port = dec-notes -> 192.168.1.49
              #pfctl -sr
              pass in quick on vlan0 reply-to (vlan0 <my wan="" gateway="">) inet proto tcp from <remote  ip="">to 192.168.1.49 port = dec-notes flags S/SA keep state label "USER_RULE: NAT "
              #pfctl -sa
              rdr on vlan0 inet proto tcp from any to <my wan="" ip="">port = dec-notes -> 192.168.1.49
              pass in quick on vlan0 reply-to (vlan0 <my wan="" gateway="">) inet proto tcp from <remote  ip="">to 192.168.1.49 port = dec-notes flags S/SA keep state label "USER_RULE: NAT "
              #pfctl -s rules -vv
              @54 pass in quick on vlan0 reply-to (vlan0 <my wan="" gateway="">) inet proto tcp from <remote  ip="">to 192.168.1.49 port = dec-notes flags S/SA keep state label #"USER_RULE: NAT "
              rdr on vlan0 inet proto tcp from any to <my wan="" ip="">port = dec-notes -> 192.168.1.49
              #cat /tmp/rules.debug
              rdr on vlan0 proto tcp from any to <my wan="" ip="">port { 3333 } -> 192.168.1.49
              pass in quick on $wan reply-to (vlan0 <my wan="" gateway="">) proto tcp from {  <remote  ip="">} to {  192.168.1.49 } port = 3333 keep state  label "USER_RULE: NAT "
              #pfctl -s nat -v
              rdr on vlan0 inet proto tcp from any to <my wan="" ip="">port = dec-notes -> 192.168.1.49
                [ Evaluations: 51        Packets: 49        Bytes: 7522        States: 0    ]
                [ Inserted: uid 0 pid 48514 ]

              If it was my box i think my next move would be to boot from a live cd and keep it as close to default as possible and then make a portforward and run the tcpdump to see what happens.</my></remote ></my></my></my></remote ></my></remote ></my></my></remote ></my></my></mss></deleted>

              /Perry
              doc.pfsense.org

              1 Reply Last reply Reply Quote 0
              • F Offline
                fr3ddie
                last edited by

                As first: sorry for the late.

                If it was my box i think my next move would be to boot from a live cd and keep it as close to default as possible and then make a portforward and run the tcpdump to see what happens.

                Agreed, but I'm pretty sure the portforwardings were working in the initial install: I was thinking about some sort of "bug" (with an extended meaning, also some strange configuration interaction) for this reason. The next step could be to reinstall from scratch pfSense and to re-import the configuration, to see if anything changes. Obviously if you can't see anything strange in the output of the next commands or if you have some other ideas to try :)
                Definitively is really a strange issue :(

                Attached there are the outputs of the commands you requested.

                pfctl_sn_and_sr.txt
                cat_tmp_rules_debug.txt
                pfctl_sa.txt
                pfctl_s_nat_v.txt

                1 Reply Last reply Reply Quote 0
                • F Offline
                  fr3ddie
                  last edited by

                  @fr3ddie:

                  Attached there are the outputs of the commands you requested.

                  And a post more, because of attachment size limit.

                  pfctl_s_rules_vv.txt

                  1 Reply Last reply Reply Quote 0
                  • C Offline
                    cmb
                    last edited by

                    Do you have captive portal enabled on the interface that has a problem?  Does anything change if you disable traffic shaping?

                    1 Reply Last reply Reply Quote 0
                    • F Offline
                      fr3ddie
                      last edited by

                      Do you have captive portal enabled on the interface that has a problem?

                      Yes I have it enabled but the PCs where I'd like to portforward a connection are excluded by meanings of MAC address ("Pass-through MAC").

                      Does anything change if you disable traffic shaping?

                      Tryed to, but anything changes :(

                      P.S.: When will v1.2.3 be released (more or less)? Maybe I can try to reformat the machine when it comes, just to avoid a new release upgrade if I do a reformat now.

                      1 Reply Last reply Reply Quote 0
                      • F Offline
                        fr3ddie
                        last edited by

                        I found something!! It's the CaptivePortal (bug or misconfiguration?)

                        • Brand new machine;
                        • complete reformat with v1.2.3;
                        • complete manual reconfiguration of pfSense: only the DHCP-server & CaptivePortal configurations have been imported into pfSense;
                        • there are 90 CaptivePortal users and 145 uniq MAC addresses in DHCP-server (I match an identity by means of a MAC_address+user/pass)

                        Please see attached files to see my CaptivePortal and DHCP-server configuration

                        Now some strange things occur…

                        • if I disable the any-->192.168.0.40 rule in "Allowed IP addresses" nothing works in the LAN (but I can understand this because that machine is the DNS server and on pfSense it is set as the only DNS server, passed to DHCP clients too), no access to CaptivePortal page nor internet access not anything;
                        • if I enable the previous rule everything works but I have the problem described in previous posts (no access to static clients by internet and no NAT-reflecting working for any LAN machine) ---> !!note that the 2 static machines in LAN have the appropriate entry in "Pass-through MAC"!!
                        • if I add 2 rules to "Allowed IP addresses" such as: 192.168.1.9-->any (static-client-->any) everything works as expected (external access to that machine, NAT-reflecting working, etc.)
                        • if I completely disable the CaptivePortal the result is the same as previous point: everything works but for all the LAN's machines
                        • Note: configuration and issues are the same of all my previous posts, nothing has changed (I reconfigured manually the whole pfSense the same way it was before the reformat)

                        So: IMHO definitively is a CaptivePortal issue.

                        Now I don't know if it's a bug or a misconfiguration by my side but, as far as I can remember, when there were a few users registered to CaptivePortal everything was working as expected: maybe an issue related to BIG number of users in the CaptivePortal?

                        I can provide complete configuration-backup file if you need it, but not on the forum (because of sensitive data in it), my e-mail is: fr3ddie at fr3ddie dot it

                        Please answer, I'm sure that if this is not a misconfiguration issue you'll like to fix a bug like this before 1.2.3 release.

                        DHCP_01.jpg
                        DHCP_01.jpg_thumb
                        DHCP_02.jpg
                        DHCP_02.jpg_thumb
                        Captive_01.jpg
                        Captive_01.jpg_thumb
                        Captive_02.jpg
                        Captive_02.jpg_thumb
                        Captive_03.jpg
                        Captive_03.jpg_thumb

                        1 Reply Last reply Reply Quote 0
                        • F Offline
                          fr3ddie
                          last edited by

                          More attachments

                          Captive_04.jpg
                          Captive_04.jpg_thumb
                          Captive_05.jpg
                          Captive_05.jpg_thumb
                          Captive_06.jpg
                          Captive_06.jpg_thumb
                          Captive_07.jpg
                          Captive_07.jpg_thumb

                          1 Reply Last reply Reply Quote 0
                          • F Offline
                            fr3ddie
                            last edited by

                            Is there anybody?  :'(

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.