Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Default rule - fail

    Scheduled Pinned Locked Moved Firewalling
    15 Posts 5 Posters 7.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K Offline
      kejianshi
      last edited by

      Thats an epic novel you posted there.

      Not sure whats up, but seeing as how you seem to have two connections there and this is usually cause when connections don't enter and exit along the same routes that they should, my guess is that your connections are not near as sticky as you would like to believe.

      Maybe set up manual outbound NAT with a outbound route per interface?

      1 Reply Last reply Reply Quote 0
      • D Offline
        doktornotor Banned
        last edited by

        @kejianshi:

        my guess is that your connections are not near as sticky as you would like to believe.

        Yeah, bingo.

        1 Reply Last reply Reply Quote 0
        • B Offline
          BenKenobe
          last edited by

          If they aren't sticky then the option in pfSense for sticky connections doesn't work correctly - this is supposed to be a 'stateful' firewall.

          The ONLY place the stickiness can fail is outbound - it can't fail inbound because the remote session is utterly unaware of the 'other' IP - meaning the only place that's common is pfSense not applying 'states' correctly and ensuring that a session started on WAN stays on WAN and the load balancing should respect that 'state'.

          I can't possibly start a bunch of outgoing NAT - makes a nonsense of load balancing to do so - besides I'd need different nat for different devices to either WAN or OPT1 - I might as well run two seperate pfSense boxes if that's the case. If states aren't being respected then that's a bug IMHO.

          1 Reply Last reply Reply Quote 0
          • B Offline
            BenKenobe
            last edited by

            Anyone know how to log which packets are going via which 'network' - packet capture can only work on one at a time.

            I checked the state tables and it isn't indicated 'which' network the state belongs to - merely that a state exists. - I take that back - it calls it router -  :o

            I can't see the incoming 'router' though only the outgoing …

            Thinking about this it still doesn't explain WHY an attempt to reach GMail via port 443 from the LAN is being blocked - it should be permitted - there ARE no block rules in place outbound on LAN, WAN or OPT1 .... inbound yes but there are no user defined OUTBOUND blocks.

            1 Reply Last reply Reply Quote 0
            • panzP Offline
              panz
              last edited by

              Can't see the NAT for port 443

              pfSense 2.3.2-RELEASE-p1 (amd64)
              motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

              1 Reply Last reply Reply Quote 0
              • I Offline
                iamzam
                last edited by

                This has nothing to do with NAT or Load Balancing.  It is the normal blocking of the final session packets FIN ACK because the firewall has already closed the connection due to receiving a RST from the destination or has otherwise closed the session

                http://doc.pfsense.org/index.php/Logs_show_%22blocked%22_for_traffic_from_a_legitimate_connection,_why%3F

                http://forum.pfsense.org/index.php?topic=58827.0

                1 Reply Last reply Reply Quote 0
                • K Offline
                  kejianshi
                  last edited by

                  Hmmmm - If thats the case, then am I to understand that there has been no actual call drops or offline states being cause?  Only some log noise?
                  Everything on the network works fine then?

                  1 Reply Last reply Reply Quote 0
                  • I Offline
                    iamzam
                    last edited by

                    BenKenobe, on the mobile device are you actually being blocked from accessing gmail, or is it that you just see these blocked packets in the logs?

                    If you are actually being blocked and you just happened to post the log snippet that only contains the blocked FIN ACK packets, then you probably have a real problem, otherwise you are likely seeing the session reset packets only being blocked.

                    In your syslog do you see any other packets blocked by this default rule with flags different than FA such as SYN, SYN/ACK, etc.?

                    1 Reply Last reply Reply Quote 0
                    • K Offline
                      kejianshi
                      last edited by

                      Yeah - I have a log full of these:

                      127.0.0.1:3128 TCP:FA

                      I ignore them.  Everything is working fine.

                      Wouldn't it be nice if we could enter in a setting some place things to not log?
                      Like TCP:FA, TCP:FPA etc, etc….  It would make the logs more meaningful.

                      1 Reply Last reply Reply Quote 0
                      • B Offline
                        BenKenobe
                        last edited by

                        I never asked her and she doesn't complain, I asked and her response is that mostly it is OK, occasionally it times out but not all the time.

                        If these 'blocks' are normal behaviour (which I appreciate) why log them at all - as has been said it would be nice to be able to clean up what is and isn't reported.

                        I'm just a little perplexed why a stateful firewall would block ANY outgoing packets unless explicitly told to do so, incoming I can buy into but outgoing - just doesn't seem right - why would the other side of the connection close the session - surely that's the session initiators job ?

                        1 Reply Last reply Reply Quote 0
                        • K Offline
                          kejianshi
                          last edited by

                          Yeah….  and...  Did I mention...

                          I have a log full of these:

                          127.0.0.1:3128    TCP:FA

                          I ignore them.  Everything is working fine.

                          Wouldn't it be nice if we could enter in a setting some place things to not log?
                          Like TCP:FA, TCP:FPA etc, etc....  It would make the logs more meaningful.

                          Maybe a regular expression filter as a package?  Devs?  Anyone...

                          (I hear crickets chirping...)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.