Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UDP NAT Problem : Random NAT bug ?

    Scheduled Pinned Locked Moved NAT
    14 Posts 4 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • U Offline
      user183
      last edited by

      A tcpdump shows non-nated packets (lan address) in my regular wan interface

      This sounds very similar to my problem!
      The LAN address also appears in the WAN interface occasionally when I watch the WAN interface with TCPDUMP.

      Please see my post earlier this week.
      http://forum.pfsense.org/index.php/topic,62519.0.html

      1 Reply Last reply Reply Quote 0
      • I Offline
        it_wyp
        last edited by

        Thanks for responding.

        I'm not sure but i think this is a different problem, you say you can't reproduce your bug on your secondary FW while mine is reproducible on the secondary, my TCP sessions does'nt seems to have problems too.

        hard to say if this is relevant, maybe the "NAT bug" is a default behavior when the Pfsense doesn't know what to do, it may not be directly related to the root cause.

        1 Reply Last reply Reply Quote 0
        • U Offline
          user183
          last edited by

          I can now reproduce it on the secondary
          It happens very rarely on the secondary but it still happens.

          So, now we have two users with the same NAT problem.
          You are also using pfSense 2.0.2 like I am.
          Also, I have been using pfSense in production since 2010.

          1 Reply Last reply Reply Quote 0
          • jimpJ Offline
            jimp Rebel Alliance Developer Netgate
            last edited by

            Sounds like this:
            http://redmine.pfsense.org/issues/958

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • I Offline
              it_wyp
              last edited by

              Just upgraded to 2.0.3 : same problem.

              Indeed it seems related to this old issue, but i'm not using floating rules.

              PS : jimp, thanks for writing the PFsense Guide, excellent book ;)

              1 Reply Last reply Reply Quote 0
              • jimpJ Offline
                jimp Rebel Alliance Developer Netgate
                last edited by

                Interface group rules could also cause that. Or if your WAN or WAN2 don't have a gateway selected. Or if you've somehow otherwise disabled reply-to.

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • I Offline
                  it_wyp
                  last edited by

                  Interface group rules could also cause that.
                  I don't use them neither.

                  If your WAN or WAN2 don't have a gateway selected.
                  Gateway selected on both wan.

                  If you've somehow otherwise disabled reply-to.
                  I don't see how to make this, could you please explain me how to check it is well enabled ?

                  Although, in the old bug, it seems reproducible (as far as i understand the syn ack is always on the wrong interface).
                  In my case, it actually works for some time before giving weird results.
                  I just need to kill the states to temporarily fix the problem.

                  This is because i'm not sure it's something "disabled" but really a bug.

                  BTW, thanks for taking of your time for me.

                  1 Reply Last reply Reply Quote 0
                  • U Offline
                    user183
                    last edited by

                    "reply-to" is in the System -> Advanced -> Firewall and NAT menu

                    1 Reply Last reply Reply Quote 0
                    • I Offline
                      it_wyp
                      last edited by

                      Thanks.

                      the box isn't checked, so i assume it's not disabled.

                      (FYI, have tried to set the Firewall Optimization Options to conservative, but same results).

                      1 Reply Last reply Reply Quote 0
                      • D Offline
                        dhatz
                        last edited by

                        @it_wyp:

                        Just upgraded to 2.0.3 : same problem.

                        Could you check with pfsense 2.1 ?

                        Btw Firewall Optimization Options => conservative only increases the state timeouts for TCP & UDP. It would be handy if you'd want to keep a UDP NAT state with a long period between "ping" packets. You can check your system's values with pfctl -st

                        1 Reply Last reply Reply Quote 0
                        • jimpJ Offline
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          We'll need to see the full /tmp/rules.debug to tell much more.

                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • I Offline
                            it_wyp
                            last edited by

                            Could you check with pfsense 2.1

                            I'm sorry but my firewalls are in a production environment, i can't use beta versions as any devs problem would have major impact.
                            If this is the only way to investigate, i would have to build a test case in a lab but i don't know when.

                            Btw Firewall Optimization Options => conservative only increases the state timeouts for TCP & UDP.
                            I suspect a miss function in the way UDP sessions are handled.
                            As you certainly know, UDP isn't really statefull, so Pfsense has to work on "unperfect" sessions.
                            I was assuming that Pfsense (after some time) was considering my udp stream as a new one and treat it differently (in that case, without nat and on the wrong eth).
                            As TCP has no problem, i was thinking it was a good idea. that's why i tried the conservative mode, it seems i was wrong.

                            With the pfctl -st, i will check if my "random problem" becomes more reproductive, thanks !

                            I will send you the /tmp/rules.debug as soon as possible (a pm will be ok ?)

                            1 Reply Last reply Reply Quote 0
                            • I Offline
                              it_wyp
                              last edited by

                              I've just checked the file content, i'm sorry, but /tmp/rules.debug contains way to much private data, i'm sure you will understand that i can't send it to someone without some serious NDA.

                              In order to let you investigate properly, i will try to reproduce my problem in a lab, i'll come to this topic as soon as possible.

                              Sorry for the delay.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.