Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense is blocking/half-blocking traffic from MPLS networks

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 5 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hphan082
      last edited by

      Hi everyone,
      We are running a setup with pfsense where we running pfsense in one location (I'll call it MAIN). And we have remote location (Location1,Location2 and Location3) connect back to Main via MPLS.

      I just did a cutover from another firewall to pfsense and ran into really odd issue.

      Main also has servers running, i.e Citrix, Exchange, etc. With pfsense in place, all local workstation within MAIN are working fine: internet ok, exchange ok, etc.
      However, I got reports from all Remote Locations that they are able to get to Webmail (http–> https redirection), but Outlook cannot connect. And they can't get to Citrix login page (http--> https redirection). ALL DNS record are pointing to internal IPs since everything is within MPLS network.

      I have added all remote location to the INTERNAL interface's firewall rule. However, when i looked at traffic log, I'm seeing that the return traffic from MAIN --> REmote-Location are being blocked by pfsense.

      Am I missing a configuration somewhere?
      Please help me. I attached some screenshot with this post.
      ![Firewall Log.PNG_thumb](/public/imported_attachments/1/Firewall Log.PNG_thumb)
      ![Firewall Rules.PNG](/public/imported_attachments/1/Firewall Rules.PNG)
      ![Firewall Rules.PNG_thumb](/public/imported_attachments/1/Firewall Rules.PNG_thumb)
      ![Firewall Log.PNG](/public/imported_attachments/1/Firewall Log.PNG)

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        I think you don't understand the way rules work, how would remote locations be coming in pfsense int interface??

        did you turn off nat?  If not your going to have to setup port forwards.  If running on private networks did you disable block rfc1918 rule that is on by default on the wan interface?

        so you have this right

        main users –- (int) pfsense (pub) -------- mpls ------- remote

        So as remote make connections to stuff in main users network they hit PUB inteface.. This is where rules are put in.

        Rules are INBOUND to an interface..  Putting rules on int interface are to allow or stop where your main users go..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • H
          hphan082
          last edited by

          hi John,
          No public interface.
          Picture the MPLS is the internal subnets that all using the pfsense is the gateway.

          the issue is these subnets are having problem communicating correcting to each other.

          main users –- (int)pfsense (int) --- mpls --- remote

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            so your saying your mpls is connect to the same interface that your users are connected too??  That makes NO sense.. And how would pfsense be used in that seutp?

            There should be an interface that your main network is connected to, and then there should be an interface that your mpls is connected too.  This would not be the SAME interface.. It could be a vlan on the interface ok - but you would have those tabs on your firewall rules if setup correctly.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • H
              hphan082
              last edited by

              No, not the same interface. I'm not that bad. , :) i cant figure out a way to explain it to you guys correctly, so It's ok. I'll figure things out.

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                i cant figure out a way to explain it to you guys correctly

                make a drawing.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • dotdashD
                  dotdash
                  last edited by

                  Try putting some floating pass rules for local to local traffic, and tag them quick.

                  1 Reply Last reply Reply Quote 0
                  • H
                    hphan082
                    last edited by

                    Let's see if this one help. :)

                    the way the MPLS is configured, all default traffic at remote location are going through MPLS and using the pfsense as the internet gateway.

                    All PC under 10.24.42.0/24 network is using PFSENSE as the gateway.

                    I hope this clear out why I had to add the allow list into the INTERNAL interface of the pfsense.

                    I've never tried floating rule. The weird thing I notice is i open * * under internal rule, and firewall log stated some traffic are blocked by default deny all. not sure where it is.

                    Also, to add: from 192.168.0.0/24, i can ping 10.24.42.20 and 30, and I can RDP back and forth. however, .30 is exchange server, and outlook client in 192.168.0.0/24 cannot connect to Exchange. Really odd behavior.

                    ![MPLS with PFSENSE.PNG](/public/imported_attachments/1/MPLS with PFSENSE.PNG)
                    ![MPLS with PFSENSE.PNG_thumb](/public/imported_attachments/1/MPLS with PFSENSE.PNG_thumb)

                    1 Reply Last reply Reply Quote 0
                    • dotdashD
                      dotdash
                      last edited by

                      @hphan082:

                      I've never tried floating rule. The weird thing I notice is i open * * under internal rule, and firewall log stated some traffic are blocked by default deny all. not sure where it is.

                      The ruleset ends with an implicit deny all.
                      Floating rules do not exit after match like normal rules, you have to check the box after 'Quick'.
                      Try a floating rule like pass, quick, dir any, source- local subnets, dest- local subnets…

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        You have asymmetric routing in that case. Go to System>Advanced, Firewall/NAT, check "Bypass firewall rules for traffic on the same interface".

                        1 Reply Last reply Reply Quote 0
                        • H
                          hphan082
                          last edited by

                          thank you CMB. I think this is it! I will test with again maybe next week

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            That is a HORRIFIC setup..  Not counting the asymmetric routing.. Pfsense has no control over connecting from mpls to your machines..  And when does work your hairpinning.

                            Move the router to OUT side pfsense on a different interface – like the attached.  Even if you do it with a vlan and the same physical interface your currently using.  Setup a transit network between pfsense and the mpls router vs using same network your main network is on.

                            bettersetup.png
                            bettersetup.png_thumb

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.