Weird issue with OPT1 internet access
-
@KOM:
First, for a web server you shouldn't do a 1:1 NAT. Just create port-forward for 80 and 443.
Next, for a port-forward to work, you also need a complimentary rule on WAN to allow the access in. Please post your WAN rules.
This isn't a web server or I'd have forwarded those ports, the issue is getting HTTP access going from this server to the outside world. I can ICMP from the server fine but making any HTTP requests with a web browser or trying to update using Windows Update fails with no error in the firewall log. Workstations are working fine but they're on LAN and not OPT1…
-
Right, I've now finished creating any necessary VLANs and restricted the addressing to what is required. I've added duplicate rules for VLAN10 and VLAN20 as has been added in VMLAN (whilst replacing the source to their respective subnet).
VLAN10 and VLAN20 can access HTTP but VMLAN still cannot, updated screenshots above.
This isn't a DNS issue as performing "nslookup google.co.uk" returns:
C:\Windows\system32>nslookup google.co.uk Server: UnKnown Address: 192.168.1.1 Non-authoritative answer: Name: google.co.uk Addresses: 2a00:1450:4009:80d::2003 31.55.166.213 31.55.166.217 31.55.166.218 31.55.166.215 31.55.166.219 31.55.166.212 31.55.166.216 31.55.166.214
UPDATE: I've tried removing the allow all rules from the OPT1 (VMLAN) interface and the firewall correctly shows it blocking the DNS request, allowing this through a rule then correctly shows a block accessing the websites IP address on port 80, allowing this as a rule still doesn't allow HTTP requests :/
-
And you're sure no squid/transp proxy is installed?
If it was me I'd:
-
create a rule to pass (but log!) all http traffic
-
get rid of any non-default nat/port forwarding rules
-
look with tcpdump on the external (WAN) interface. (tcpdump -n -i wanif port 80)
-
-
"the issue is getting HTTP access going from this server to the outside world"
Then why do you have a 1:1 nat setup?? You do understand this is point and click working… So something stupid your over looking..
-
"the issue is getting HTTP access going from this server to the outside world"
Then why do you have a 1:1 nat setup?? You do understand this is point and click working… So something stupid your over looking..
The 1:1 was added to assign this server an inbound/outbound IP for usage later. Yes I understand that once there is an allow any rule it should be all working as expected but it isn't and I know there must be something stupid I am overlooking but I cannot seem to figure out what. Hence my post here.
I have started again by demoting the Windows server and destroying the domain.
pfsense has 5 interfaces:
WAN
LAN - 10.0.0.0/24
OPT1 (VMLAN) - 10.0.5.0/24
OPT2 (VLAN10) - 10.0.10.0/24
OPT3 (VLAN20) - 10.0.20.0/24Windows Server is on VMLAN:
10.0.5.2
GW: 10.0.5.1
DNS: 10.0.5.1Outbound NAT is set to automatic:
ICMP requests from the Windows server are working fine as are DNS requests but HTTP is not even though the Network and Sharing Center states that there is Internet access.
Windows Firewall is turned off for all connection types, IE enhanced security configuration is also disabled for administrators (which is the account in use).If I create a firewall rule on VMLAN to log requests on port 80 I can see that this is passed on the firewall log although the server gets "Page can't be displayed"… I'm stumped because everything seems to be correct.
-
Try tcpdump on your external interface to make sure it requests the page correctly?
-
Try tcpdump on your external interface to make sure it requests the page correctly?
172.16.0.78 being the pfsense LAN address assigned from the modem (WAN)
16:28:48.909893 aa:b7:69:52:a3:ec > 00:37:b7:15:a2:66, ethertype IPv4 (0x0800), length 66: (tos 0x2,ECT(0), ttl 127, id 8896, offset 0, flags [DF], proto TCP (6), length 52) 172.16.0.78.4737 > 31.55.166.216.80: Flags [SEW], cksum 0x8c89 (correct), seq 655046013, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 16:28:48.928957 00:37:b7:15:a2:66 > aa:b7:69:52:a3:ec, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 57, id 7244, offset 0, flags [none], proto TCP (6), length 52) 31.55.166.216.80 > 172.16.0.78.4737: Flags [S.], cksum 0x8c1d (correct), seq 3750408064, ack 655046014, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0 16:28:48.929576 aa:b7:69:52:a3:ec > 00:37:b7:15:a2:66, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 127, id 8897, offset 0, flags [DF], proto TCP (6), length 40) 172.16.0.78.4737 > 31.55.166.216.80: Flags [.], cksum 0xe5a2 (incorrect -> 0x3b00), seq 1, ack 1, win 1024, length 0 16:28:48.929689 aa:b7:69:52:a3:ec > 00:37:b7:15:a2:66, ethertype IPv4 (0x0800), length 301: (tos 0x0, ttl 127, id 8898, offset 0, flags [DF], proto TCP (6), length 287) 172.16.0.78.4737 > 31.55.166.216.80: Flags [P.], cksum 0xe699 (incorrect -> 0x5581), seq 1:248, ack 1, win 1024, length 247 16:28:49.242823 aa:b7:69:52:a3:ec > 00:37:b7:15:a2:66, ethertype IPv4 (0x0800), length 301: (tos 0x0, ttl 127, id 8899, offset 0, flags [DF], proto TCP (6), length 287) 172.16.0.78.4737 > 31.55.166.216.80: Flags [P.], cksum 0xe699 (incorrect -> 0x5581), seq 1:248, ack 1, win 1024, length 247 16:28:49.852286 aa:b7:69:52:a3:ec > 00:37:b7:15:a2:66, ethertype IPv4 (0x0800), length 301: (tos 0x0, ttl 127, id 8900, offset 0, flags [DF], proto TCP (6), length 287) 172.16.0.78.4737 > 31.55.166.216.80: Flags [P.], cksum 0xe699 (incorrect -> 0x5581), seq 1:248, ack 1, win 1024, length 247 16:28:51.055344 aa:b7:69:52:a3:ec > 00:37:b7:15:a2:66, ethertype IPv4 (0x0800), length 301: (tos 0x0, ttl 127, id 8901, offset 0, flags [DF], proto TCP (6), length 287) 172.16.0.78.4737 > 31.55.166.216.80: Flags [P.], cksum 0xe699 (incorrect -> 0x5581), seq 1:248, ack 1, win 1024, length 247
-
Seems that my issue may be related to: https://forum.pfsense.org/index.php?topic=85797.0
Reply #4 from cmb suggests that I shouldn't have xn nics when I do, running pfsense 2.2.3 and XenServer 6.5. I have now disabled hardware checksum offload (System -> Advanced -> Networking) and disabled ethtool-tx on all VIFs attached to the pf vm with no luck…
UPDATE: That post mentions to do it for rx as well which has fixed my issue! Thanks all.
-
So your issue is you were running on xenserver.. But did not mention that anywhere ;) until now..
-
So your issue is you were running on xenserver.. But did not mention that anywhere ;) until now..
I did mention it was on a vm on my first post, just forgot to mention the hv… Apologies :-[
-
Those incorrect checkums in your tcpdump do look creepy.. :)
I have no experience with XenServer but can't you use a different type of NIC ? (for example an intel e1000 or so?)
-
Those incorrect checkums in your tcpdump do look creepy.. :)
I have no experience with XenServer but can't you use a different type of NIC ? (for example an intel e1000 or so?)
We use Broadcom NetXtreme BCM5720 Gigabit, I have a feeling that this is a XenTools issue…
-
Yes, that's your hardware NIC. But can you try to reconfigure your pfsense virtual machine to use a different nic-model/type? (not sure if that's possible but I'd think so)
That way it won't use the XenTools/virtual nic.
-
simple search here on pfsense forums for xenserver would of pointed you to many threads with pointing out the checksum problems.
There is even a Sticky in the VM section
https://forum.pfsense.org/index.php?topic=88467.0