Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to Access WebGUI

    Problems Installing or Upgrading pfSense Software
    4
    22
    30.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      amer1canparatrooper
      last edited by

      kejianshi, I owe you one.  Sincerely, thanks for taking time to help me out with this.  I met your team at the SELF conference last month and was impressed on how helpful and excited you guys are about pfSense technology.  You going the extra mile to continue to help me is not surprising, just shows how dedicated you are and the passion you have for this awesome technology.  Anyhoo, I've got more to report.

      Now, here's the interesting part.  Once before, I was able to access the WebGUI, however, it was only because WAN was the only interface assigned (no LAN or em1 assigned).

      I went through each of your suggestions but didn't come up with anything.

      Now, I know at least this much.  My host firewall is not prohibiting me from accessing the WebGUI.  The problem is only happening when I enable em1/LAN card, which then takes the WebGUI offline.  As you seen from my screenshot, LAN/em1 is simulating Intel PRO / 1000 MT Desktop, just the same as the WAN bridge adapter em0.

      I'm happy now that at least I can access the WebGUI, but now I have to continue to trouble shoot why exactly I'm being kicked off when I add the LAN card set to intnet within virtualbox.  It just doesn't make sense.  I plan to try a different interface type, specifically using maybe using an different Intel or AMD interface.

      Stay tuned.

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        Well, I know the rest of the answer also.  Remember I said there was more to do?
        BTW - I'm not with the PFsense crew, but I did stay in a holiday inn express last night.
        I do think they have come up with a great thing. 
        They are smarter than me with this though.  This would be their "lite work".

        For the next part, we need to make some changes to you LAN port on pfsense and also your client VMs.
        I'll type abit about that after I take the kid for a walk.  I just rebuilt a dryer for last hour…  So exciting.

        1 Reply Last reply Reply Quote 0
        • A
          amer1canparatrooper
          last edited by

          Ha!  You're funny.

          Anyway, I appreciate you working me through this and being so giving.  Maybe I can figure out a way to buy you lunch.

          More tinkering to do with this after work tomorrow.

          Again Sir, thank you much.

          1 Reply Last reply Reply Quote 0
          • P
            phil.davis
            last edited by

            pfSense is a firewall - it defaults to keeping out the nasties on the public internet side.

            a) When there is WAN and LAN, then everything originating on WAN is blocked by default. In production, this is always what you want (then you add rules to open up the specific things that you want outside internet to be able to access).

            b) When there is just WAN (unusual/special config), then access is allowed to webGUI (and a few ports - I won't try to specify them exactly here) on WAN.

            So, you can get in when there is just WAN. When you add LAN, then the webGUI "anti-lockout" rule moves to LAN, and you lose access from WAN. This is usually what you want.

            To keep WAN access, then, before adding the LAN interface, add pass rules of your own on WAN to allow the things you want. (For ease in testing, allow all, but in production if the WAN faces the real internet, don't do that!)

            As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
            If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Could easily end up with 'too many chefs' in this thread and just confuse things further but let me just say that everything you have described is exactly what I would expect to see. Your setup is behaving perfectly, you don't have any random weirdness to deal with.  ;)

              Kejianshi seems to have this under control.  :)

              Steve

              1 Reply Last reply Reply Quote 0
              • K
                kejianshi
                last edited by

                Well - Next step, as I see it, will be getting his VMs that are to be client to the PFsense un-bridged from the Host's network and on the internel network.  I'd like to see the client VMs get DHCP from intnet and I'd like to see intnet given a sane subnet.  After the VM clients can access the pfsense LAN side he can close the gaping security holes that are there just to give him gui access from the host machine.  Then he should be able to admin his system from the VM clients same as any network using pfsense (Still the issue of double NAT - Talk converting to typical pfsense setup later)

                1 Reply Last reply Reply Quote 0
                • A
                  amer1canparatrooper
                  last edited by

                  Hey guys.

                  Well, got to do some more tinkerin'  ;D

                  As per kejianshi:

                  @kejianshi:

                  Well - Next step, as I see it, will be getting his VMs that are to be client to the PFsense un-bridged from the Host's network and on the internel network.  I'd like to see the client VMs get DHCP from intnet and I'd like to see intnet given a sane subnet.

                  Yes, this is my intent.  Ideally, I'd just like to get it up and running (making em1 a dhcp server) so that I can create my own internal network of VM servers and hosts.

                  @phil.davis:

                  To keep WAN access, then, before adding the LAN interface, add pass rules of your own on WAN to allow the things you want. (For ease in testing, allow all, but in production if the WAN faces the real internet, don't do that!)

                  Phil, truly, I need to do more research.  I'm amazed at all the options and the ability to modify all the granular specifics.  My window to do this will largely be this weekend, however, I'm having trouble adding the pass rule.

                  I tried under advanced > Disable webConfigurator anti-lockout rule > added the LAN > and then was unable to access the WebGUI again.

                  Also, I went to firewall > rules > Single Host or Alias > 192.168.1.203 > and yet I was still unable to access the WebGUI.

                  Again, just to get this up and running, what would I change in within the WebGUI in order to turn on LAN intnet (DHCP node) for my LAN guests and still be able to access the WebGUI?

                  Cheers gents.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    Well - Earlier, I gave you a couple of commands to shut down and then reactivate the firewall rules if you ever locked yourself out with a firewall rule change.  So, if you locked yourself out, use:

                    pfctl -d

                    Then go into the web gui and change back whatever firewall rule you changed that locked you out.

                    Then.

                    pfctl -e

                    Next, to get your intnet on your pfsense handing out DHCP, you will need to go to your Interfaces > LAN
                    Make sure its static type.

                    Then give it an IP like 10.14.73.1 / 24    (Thats just a random IP.  Pick anything you like in the private IP range)

                    Make sure gateway = none.

                    Make sure you are applying setting.

                    Then you have to go into services > DHCP server

                    click the LAN tab.  Check the activate DHCP button.

                    Now give an DHCP range like 10.14.73.50 - 10.14.73.200

                    (This determines the start and end point for IPs auto assigned by DHCP  Later you can add static IPs above and below this range if you like)

                    Apply settings…

                    Now, you have a DHCP server and a sane IP range for a LAN

                    To be sure this doesn't cause issues, make sure the LAN Ethernet interface you added in your isn't bridged.  You want that one internat network.  (intnet)

                    Now, to get the other VMs to get their IPs from pfsense you will also have to change their network adapter setting to internal also with same name (intnet).

                    Assuming you do all those things and don't typo and no crazy unknown circumstances, you should have a network.

                    Should be able to access the pfsense web gui from your VM's web browsers.

                    1 Reply Last reply Reply Quote 0
                    • P
                      phil.davis
                      last edited by

                      Again, just to get this up and running, what would I change in within the WebGUI in order to turn on LAN intnet (DHCP node) for my LAN guests and still be able to access the WebGUI?

                      Before enabling LAN, add a pass rule to WAN, and might as well enable SSH:
                      a) Add an alias for ports HTTP (80), HTTPS (443) and SSH (22) - e.g. call it MgmtPorts
                      b) Add rule on WAN: Pass, IPv4, protocol any, source WAN net, port any, destination WAN address, port MgmtPorts.
                      c) System->Advanced, Admin Access, Enable Secure Shell.

                      Now you can always come from the WAN network side to the webGUI, or ssh in to the WAN side and get a command prompt.

                      Now enable the LAN side.

                      As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                      If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                      1 Reply Last reply Reply Quote 0
                      • A
                        amer1canparatrooper
                        last edited by

                        Bang!  Bingo!  Kaboom!!!

                        That got it guys.  Cheers to all of you.

                        I have successfully been able to pass the intnet to my virtual machines and can also access the WebGUI from both my host/guest machines.

                        I noticed that I had to turn off the firewall after I had added the LAN, but no biggie.  Now that I have the bridge from WAN to LAN, I can now do some experimenting and also take a few classes on working with settings and advanced configurations.

                        I'm so happy.  It's truly cool to be able to now have a firewall/router that I can tinker with, set up rules, keep the bad guys out, etc.  This is going to be fun now that I have the box up and running and can now feed the internet off to my servers/hosts.  What's also cool is that I will be able to discover some of the more advanced aspects of networking, for which I only have a foundation currently as a professional.

                        Thank you all.  Thank you all again.  Now that you all have been giving to me, I hope that I can return to others the same.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          I'm excited too.  Not as excited as you, but excited…
                          Makes me remember my first time.
                          I was nervous - and so alone...
                          (No forums to help me with my first build)

                          I'm glad it turned out well.

                          Eventually, you should use a different hypervisor.  Your current setup is only as secure as the OS that is hosting it.
                          Thats yet another adventure in learning with some sort of "bare metal" / "thin" hypervisor.

                          1 Reply Last reply Reply Quote 0
                          • A
                            amer1canparatrooper
                            last edited by

                            Cheers kejianshi.  I owe you lunch man.  Be excited that your knowledge made the light turn on  ;D

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.