Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow Fragments in Rules

    2.0-RC Snapshot Feedback and Problems - RETIRED
    3
    7
    9.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      biobob
      last edited by

      Can anyone shed light on how to allow fragments in Rules. I do not see any simple method of doing this.

      thanks
      Biobob

      1 Reply Last reply Reply Quote 0
      • K
        kpa
        last edited by

        I think that's not easy to do since pfSense has this in the rules by default:

        
        scrub in on $WAN all    fragment reassemble
        scrub in on $LAN all    fragment reassemble
        
        

        That means anything the filter rules see is already unfragmented. Quote from pf.conf manual page:

        
         fragment reassemble
                   Using scrub rules, fragments can be reassembled by normalization.
                   In this case, fragments are buffered until they form a complete
                   packet, and only the completed packet is passed on to the filter.
                   The advantage is that filter rules have to deal only with complete
                   packets, and can ignore fragments.  The drawback of caching 
                   fragments is the additional memory cost.  But the full reassembly
                   method is the only method that currently works with NAT.  This is
                   the default behavior of a scrub rule if no fragmentation modifier
                   is supplied.
        
        
        1 Reply Last reply Reply Quote 0
        • B
          biobob
          last edited by

          Thanks for the Reply. I have been having a difficult time with setting up a VPN with a partner organization that uses CISCO equipment. When I asked for assistance earlier this year in the forum the answer I recieved was that the packet was being blocked by the default rule because it was fragmented and required changes to the rules to allow fragments. see http://forum.pfsense.org/index.php/topic,24743.msg128207.html#msg128207

          If packets must be reassembled prior to reaching the filter then the answer I received is not correct. Does anyone know how to allow fragmented packets in a IPSEC tunnel with PFSENSE?

          Biobob

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            FYI- You can disable those scrub rules under System > Advanced.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • K
              kpa
              last edited by

              I forgot that option, it seems that it should do what is required for allowing fragments. However, can you use NAT in combination with it? The pf.conf manual page suggests that you can't.

              1 Reply Last reply Reply Quote 0
              • B
                biobob
                last edited by

                Thanks everyone for your help. I believe we have been able to resolve the issue by going to - System - Advanced - Miscellaneous and turning on MSS Clamping for the IPSEC tunnel. Our packet captures indicated a problem with the PMTUD. I left it at the MSS default of 1400 and this is working. When we went through the difference with other tunnels that worked (CISCO to CISCO), they were all using GRE over IPSEC. We were not able to assign a GRE tunnel to IPSEC in PFSENSE, and since GRE can have the mtu set the PMTUD using a Pure iPSEC tunnel relied on ICMP type 3, subtype 4 passing from source to destination in order to get through PFSENSE filtering rules properly on the IPSEC interface. The clear df-bit did not help in our case.

                Biobob

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  To use GRE over IPsec, you need to put IPsec into transport mode – not tunnel mode. It should be possible in the 2.0 GUI (though I haven't tried it yet)

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • D DEHAAS referenced this topic on
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.