Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    URGENT HELP libvirt kvm

    Scheduled Pinned Locked Moved Virtualization
    42 Posts 4 Posters 9.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Dude I see 198.50.221.177 pinging 198.50.221.190 every second and working.. That is your wan apinger I would gather..  What are you lan rules?  Did you sniff on your wan to see if those pings to 8.8.8.8 got forwarded?  Did they get a reply on your wan and just not seeing it back on your lan?

      KVM has known issues with pfsense 2.2 - what version of kvm are you using.  Are you using any packages?  Proxy for example - why don't you fix your errors.. Why did you clock go backwards?  why can you not bind with your ldap server??  etc. etc. etc…

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • V
        volga629
        last edited by

        Yes, I added to hosts file entry for ldap and restarted ntp. To make log clear.

        1 Reply Last reply Reply Quote 0
        • V
          volga629
          last edited by

          Yes, packet capture is on WAN(bridge0) interface.

          Hypervisor: libvirt Fedora 22 server.

          libvirt-daemon-kvm-1.2.18-1.fc22.x86_64

          PFSense: 2.4 last release

          1 Reply Last reply Reply Quote 0
          • V
            volga629
            last edited by

            Bridge on WAN because we have servers with public ip and  I want make sure IPS is will protect it.

            1 Reply Last reply Reply Quote 0
            • V
              volga629
              last edited by

              Here correspond bridge on fedora server libvirt

              
              # ip a s wan_dmz
              7: wan_dmz@NONE: <broadcast,multicast,promisc,up,lower_up>mtu 1500 qdisc noqueue state UP group default 
                  link/ether fe:54:00:4d:f0:64 brd ff:ff:ff:ff:ff:ff
                  inet6 fe80::fc5f:d0ff:fece:1501/64 scope link 
                     valid_lft forever preferred_lft forever
              [root@dedi132 ~]# brctl show wan_dmz
              bridge name	bridge id		STP enabled	interfaces
              wan_dmz		8000.fe54004df064	yes		dummy1
              							vnet12
              							vnet2</broadcast,multicast,promisc,up,lower_up> 
              
              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                "I want make sure IPS is will protect it."

                What???  So your running SNORT?  So maybe that is blocking your traffic.. When did 2.4 of pfsense come out??  2.2.4 is latest..

                Its a VM right - why don't you just load last snapshot or deploy base install again..  And again a KVM has known issues with pfsense 2.2 and above

                https://forum.pfsense.org/index.php?topic=88467.0

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • V
                  volga629
                  last edited by

                  Sorry, yes you right version is 2.2.4

                  1 Reply Last reply Reply Quote 0
                  • V
                    volga629
                    last edited by

                    The interesting part setup was working until last night

                    1 Reply Last reply Reply Quote 0
                    • V
                      volga629
                      last edited by

                      Snort in not running.

                      Screenshot_Snort_fedora22_2015-09-05_14:05:34.png
                      Screenshot_Snort_fedora22_2015-09-05_14:05:34.png_thumb

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Well you have it enabled and not running - so like blocking everything?  Why would you have to add a host file for ldap – wasn't it working before?

                        So that sniff showing pings going out to 8.8.8.8 was on your wan??  Then why was it showing your 10 address then as source - that for sure would never freaking work.

                        Here is me sniffing on wan for ping of client to 8.8.8.8 see how source is my public IP..

                        That sniff made no sense to me - if on lan why was it showing what looks like your apinger every second.. But private IP pinging 8.8.8.8

                        You had errors in your log about NAT as well.. Not installing nat reflection..  Seems to me you got ALL kinds of problems for something what was working yesterday..  Snort not running, time off, can not resolve your ldap server, rules not loading?  traffic going out wan with private addresses..

                        pingsniffonwan.png
                        pingsniffonwan.png_thumb

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • V
                          volga629
                          last edited by

                          That sniff make perfect sense that point the issue is bridge0 interface, because from pfsense him self I can ping both ends LAN and WAN. Arp ping you see as I says, because pfsesne can reach ISP provider side no problem. That indicate that some issue on BRIDGE0 interface which cause traffic do not to be forwarded from LAN to WAN. I can share my screen and you can see.
                          Host file entry need for ldap because encryption port 636 where ldap server validate the CN. And each time I am reboot pfsesnse it override /etc/hosts and connection to ldap is failing, I could't find how to preserve this entry in host file. If IPS down and it not blocking traffic.

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            How does that sniff make sense??  You can see pings from public ip to public IP working - sourced from a 10.x to public IP 8.8.8.8 not working.. As it shouldn't how exactly is 8.8.8.8 going to answer you from a 10 address?

                            You stated you sniffed on pfsense WAN.. If that is the case it should be showing you WAN IP pinging 8.8.8.8 not some 10 address.

                            How exactly do you think this would work??

                            wanpings.png
                            wanpings.png_thumb

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • V
                              volga629
                              last edited by

                              Because it hit bridge0 interface and Outbound NAT is not applied and connection Outbound from LAN to WAN that why it show private ip. Secondly LAN subnet is directly connected to pfsense it will never show you in packet capture applied NAT rules.  If you sniff traffic on WAN interface and it will be inbound connection then you should see PUBLIC ip's.

                              1 Reply Last reply Reply Quote 0
                              • V
                                volga629
                                last edited by

                                How does that sniff make sense??  You can see pings from public ip to public IP working - sourced from a 10.x to public IP 8.8.8.8 not working..

                                That exactly what I am says Bridge0 interface not working !!!!!!!!!!!!!!! PFSense not FORWARDING TRAFFIC FROM PRIVATE SUBNET LAN TO PUBLIC INTERNET

                                1 Reply Last reply Reply Quote 0
                                • V
                                  volga629
                                  last edited by

                                  By The way Snort fail to start. I just updated to last package. Here the log for Snort start up.

                                  
                                  Sep 5 17:34:41	php-fpm[62471]: /snort/snort_interfaces.php: The command '/usr/pbi/snort-amd64/bin/snort -R 64956 -D -q --suppress-config-log -l /var/log/snort/snort_bridge064956 --pid-path /var/run --nolock-pidfile -G 64956 -c /usr/pbi/snort-amd64/etc/snort/snort_64956_bridge0/snort.conf -i bridge0' returned exit code '1', the output was ''
                                  Sep 5 13:34:41	snort[40294]: FATAL ERROR: pf.conf => Table snort2c does not exist in packet filter: Invalid argument
                                  Sep 5 17:34:41	php-fpm[62471]: /snort/snort_interfaces.php: [Snort] Snort START for WAN_PR01(bridge0)...
                                  Sep 5 17:34:41	php-fpm[62471]: /snort/snort_interfaces.php: [Snort] Building new sid-msg.map file for WAN_PR01...
                                  Sep 5 17:34:41	php-fpm[62471]: /snort/snort_interfaces.php: [Snort] Enabling any flowbit-required rules for: WAN_PR01...
                                  Sep 5 17:34:38	php-fpm[62471]: /snort/snort_interfaces.php: [Snort] Updating rules configuration for: WAN_PR01 ...
                                  Sep 5 17:34:38	php-fpm[62471]: /snort/snort_interfaces.php: Toggle (snort starting) for WAN_PR01(bridge0)...
                                  Sep 5 17:34:38	
                                  
                                  
                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    doktornotor Banned
                                    last edited by

                                    Dude, when you don't have absolutely basic shit working, why are you mesing with Snort? (Totally OT here in addition.)

                                    1 Reply Last reply Reply Quote 0
                                    • V
                                      volga629
                                      last edited by

                                      True Agree. I am focusing on issue of BRIDGE0

                                      1 Reply Last reply Reply Quote 0
                                      • V
                                        volga629
                                        last edited by

                                        Here are TCP settings. I disabled offload as was recommended, but result the same.

                                        TCP_Stack.png
                                        TCP_Stack.png_thumb

                                        1 Reply Last reply Reply Quote 0
                                        • V
                                          volga629
                                          last edited by

                                          I was thinking what else can be. I did tcpdump on virtual host him self Fedora Server and still see private IP, which I though on this stage I should see only public ip, because pfsense should apply outbound NAT rules. What else I can check.

                                          
                                          [root@dedi132 ~]# tcpdump -i any -vvv -nnnn -s 0 icmp
                                          16:32:24.378774 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
                                              10.18.130.50 > 8.8.8.8: ICMP echo request, id 40991, seq 641, length 64
                                          16:32:24.378782 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
                                              10.18.130.50 > 8.8.8.8: ICMP echo request, id 40991, seq 641, length 64
                                          16:32:24.378900 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
                                              10.18.130.50 > 8.8.8.8: ICMP echo request, id 40991, seq 641, length 64
                                          16:32:24.378909 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
                                              10.18.130.50 > 8.8.8.8: ICMP echo request, id 40991, seq 641, length 6
                                          
                                          
                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by

                                            "Secondly LAN subnet is directly connected to pfsense it will never show you in packet capture applied NAT rules.  If you sniff traffic on WAN interface and it will be inbound connection then you should see PUBLIC ip's."

                                            What??

                                            I assume its wan is 198.50.221.177, pretty sure in fact that is your pfsense since when I hit it I get pfsense login!  That you have webgui allowed on your wan is just another F'd up thing with this setup that is for sure

                                            why don't you PM me a login and I will take a look directly to what is going on..  What kind of BS setup do you have that devices on the lan side of pfsense would not be natted through pfsense wan??  I can tell you for sure yes you would see natted traffic on the wan and on the lan you would see the non natted traffic.  So as you can see here is me pinging you on the lan interface of pfsense where it shows my private address, and there it is going out the wan with my public IP.  And you can also see pfsense pinging its gateway every 1 second as it does with default apinger running.

                                            pfsensewanlogin.png
                                            pfsensewanlogin.png_thumb
                                            pingyounat.png
                                            pingyounat.png_thumb

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.