Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall blocks returning TCP traffic

    Scheduled Pinned Locked Moved Firewalling
    21 Posts 5 Posters 18.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tekstep
      last edited by

      The only route set on cisco is:to lan2 via pfsense1 GRE(172.31.2.9).And next pfsense1 has static routing rule to forward traffic to lan2 via pfsense2 WAN ipaddress.Blocking happens on pfsense1 because IPsec and GRE tunnels ends on it.There's a smart network administrator on a cisco side.He is smart enough to make proper routing through VPN.The trouble appears on my pfsense side,becaus I'm not good in VPN building  8)

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        System>Advanced, Firewall/NAT, check " Bypass firewall rules for traffic on the same interface ". That'll work around it for the vast majority of cases, not enough of a diagram type picture of the network to tell 100% for sure if it will here but it probably will.

        1 Reply Last reply Reply Quote 0
        • T
          tekstep
          last edited by

          @cmb:

          System>Advanced, Firewall/NAT, check " Bypass firewall rules for traffic on the same interface ". That'll work around it for the vast majority of cases, not enough of a diagram type picture of the network to tell 100% for sure if it will here but it probably will.

          I'm not sure this will help.Log shows that traffic goes in through one interface and leaves through another.And the description of this option tells about traffic entering and leaving on the SAME interface.Anyway, thanks for advice.I will try it as soon as possible.

          1 Reply Last reply Reply Quote 0
          • P
            podilarius
            last edited by

            seeing the specific routes and such would be nice.
            I used to use ipsec for a site to site VPN. I switched to openvpn mainly because the ipsec kept dropping and was a bit slower than openvpn. We have been using openvpn for about 1.5 years and have been really happy with it.I have a similar setup, but I don't use Cisco. It is 3 pfsense FWs. One at the DC, 2 at the office. 1 of those is protecting a lab (rather protecting us from the lab). routing to the lab didn't work until I added a static route on the DC FW to point to the WAN ip of LAB FW (basic firewall rules to allow LAN and DC subnets with no NAT to those from the LAN or DC subnets). I don't know why you would have any blocks going on at all. If you are getting blocks, then there might be something wrong with the rule in ipsec because this is the only place to block. If it gets there it should be past the WAN at that point.

            1 Reply Last reply Reply Quote 0
            • T
              tekstep
              last edited by

              @podilarius:

              seeing the specific routes and such would be nice.
              I used to use ipsec for a site to site VPN. I switched to openvpn mainly because the ipsec kept dropping and was a bit slower than openvpn. We have been using openvpn for about 1.5 years and have been really happy with it.I have a similar setup, but I don't use Cisco. It is 3 pfsense FWs. One at the DC, 2 at the office. 1 of those is protecting a lab (rather protecting us from the lab). routing to the lab didn't work until I added a static route on the DC FW to point to the WAN ip of LAB FW (basic firewall rules to allow LAN and DC subnets with no NAT to those from the LAN or DC subnets). I don't know why you would have any blocks going on at all. If you are getting blocks, then there might be something wrong with the rule in ipsec because this is the only place to block. If it gets there it should be past the WAN at that point.

              Are you sure that your traffic from DC to the lab is really encrypted?I think when you made a static route to the lab WAN ipaddress your DC pfsense use Internet connection instead of OpenVPN tunnel.To encapsulate traffic to the lab in OpenVPN tunnel you have to create gateway on DC pfsense with ipaddress of OpenVPN interface of lab pfsense. And then create a static route to lab subnet through this gateway.Am I wrong? I also using OpenVPN on pfsense2 with routing settings just like I wrote above.And its working quite fine.

              In my case there was no other choice between OpenVPN or IPSec.The organization with cisco is a big GSM provider.It's network administrator didn't even try to discuss any other VPN techs but GRE-over-IPsec.I was building VPN with two large GSM providers and both were insisting on IPsec.

              Back to the question of asymmetric routing.I really don't know how it happens.In firewall rules IPsec tab,Lan tab,GRE tab-on all neccessary interfaces I set rule "allow everything from everyone on every protocol" and traffic was blocked anyway.After a few hours of googling I found similar problem on one forum (don't remeber where exactly,maybe even here).At that topic the guy had the same GRE-over-IPsec and TCP blocking.This is when I started to dig about asymmetric routing.I'm glad it ends.I was fighting it since last october :)

              1 Reply Last reply Reply Quote 0
              • P
                podilarius
                last edited by

                I am very sure … I am using private IPs and is not internet routable. They have no choice but to go over the VPN.
                So here is what I have and it works.

                DB NEtwork 10.a.b.0/24
                DC route -> 10.b.c.0/24 GW 10.a.a.15 (for DC traffic)

                Office Net 10.a.a.0/24
                Office Route -> 10.b.c.0/24 GW 10.a.a.15 (for LAN traffic)

                I can get all the way from either direction.

                1 Reply Last reply Reply Quote 0
                • T
                  tekstep
                  last edited by

                  @podilarius:

                  I am very sure … I am using private IPs and is not internet routable. They have no choice but to go over the VPN.
                  So here is what I have and it works.

                  DB NEtwork 10.a.b.0/24
                  DC route -> 10.b.c.0/24 GW 10.a.a.15 (for DC traffic)

                  Office Net 10.a.a.0/24
                  Office Route -> 10.b.c.0/24 GW 10.a.a.15 (for LAN traffic)

                  I can get all the way from either direction.

                  Alright I understand. Thanks for your help!

                  1 Reply Last reply Reply Quote 0
                  • T
                    tonyw
                    last edited by

                    Hi

                    I've been having this problem as well, the only solution I found was to create a floating firewall rule for the gre interface to pass out any traffic, make sure the quick option is ticked and also set keep-state to none on the advanced options. To be honest I don't know if this is the best solution or really why it works, but it has on my setup. I've downloaded some capture files on the interfaces to go through see if I better understand it. But hope this helps.

                    1 Reply Last reply Reply Quote 0
                    • T
                      tekstep
                      last edited by

                      @tonyw:

                      Hi

                      I've been having this problem as well, the only solution I found was to create a floating firewall rule for the gre interface to pass out any traffic, make sure the quick option is ticked and also set keep-state to none on the advanced options. To be honest I don't know if this is the best solution or really why it works, but it has on my setup. I've downloaded some capture files on the interfaces to go through see if I better understand it. But hope this helps.

                      I'm surprized you managed to solve this problem using pfsense GUI.I also tried floating rules,but it didn't help in my case.

                      1 Reply Last reply Reply Quote 0
                      • P
                        podilarius
                        last edited by

                        Just an FYI. I just realized that the DC firewall is not 2.0.x. It is still 1.2.3 which allows you to put in a route through a gateway that is not on the interface.
                        This saddens me. It is a valid configuration, but, I am using OpenVPN, so I can just push the route through the client. :)

                        1 Reply Last reply Reply Quote 0
                        • D
                          dhatz
                          last edited by

                          So to summarize, is GRE-over-IPsec between Cisco and pfsense 2.0.1 configurable from webGUI ?

                          Configurations like
                          http://forum.ivorde.com/freebsd-to-freebsd-ospf-over-gre-over-ipsec-transport-mode-racoon-part-1-t860.html
                          http://www.packtpub.com/article/network-configuration-tunneling-with-free-bsd

                          1 Reply Last reply Reply Quote 0
                          • C
                            cmb
                            last edited by

                            @dhatz:

                            So to summarize, is GRE-over-IPsec between Cisco and pfsense 2.0.1 configurable from webGUI ?

                            Yes.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.