Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Network cut off when doing backup

    Scheduled Pinned Locked Moved Routing and Multi WAN
    12 Posts 2 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      peter808
      last edited by

      Today pfsense is driving me nuts  >:( >:( >:(

      I have a Siemens server with Intel quad-NIC which runs here without any problems for months.

      Today I tried to put some Snoms to the fourth NIC channel (with a switch in between) and configured a DMZ (172.23.2.x) for them.

      While I was trying to save the pfsense-config with the GUI-backup, the LAN on the first NIC-chanel (172.23.1.x) cuts itself down, so the GUI is not reachable via the first NIC-channel any more.

      It is still possible to login locally to the server, and still possible to reach the 3 other NIC-channels (with different subnets), beside the 172.23.1.0-subnet. Also the WAN-interface is reachable.

      What is strange also: if I just backup the config without the RDP-data, everything is fine, the backup completes and the 172.23.1.x-subnet stays on. To bring back the 172.23.1.x-subnet, I rebooted the server, it stays on till I do a full backup (including logs) again.

      Any hints?

      1 Reply Last reply Reply Quote 0
      • P Offline
        peter808
        last edited by

        forgot to mention: there is no suspicious entry for the NIC-cutoff in /var/log/system.log or …ntpd.log

        1 Reply Last reply Reply Quote 0
        • P Offline
          peter808
          last edited by

          As I did not get any response here, I restored a backup-conf and everything is fine again.

          1 Reply Last reply Reply Quote 0
          • P Offline
            peter808
            last edited by

            Fu…

            Some hours later, same problem again, now with another NIC-port.

            Could it be that the NIC has quit service?

            If so: should'nt I find any errors in the logs?

            Please give me some hints.

            1 Reply Last reply Reply Quote 0
            • KOMK Offline
              KOM
              last edited by

              I've never heard anything like that before.  Absolutely nothing in the System log at the time of the incident?  Doing a backup of your RRD data is disk-intensive so I would look at that first.  Saving your config has nothing at all to do with your NICs other than using your LAN NIC to send you the file.

              Today I tried to put some Snoms to the fourth NIC channel

              What's a Snom?  What's your hardware config in general?  'Siemens server' doesn't tell us much.  What version of pfSense?  Do you have any IDS packages like Snort or Suricata installed?

              1 Reply Last reply Reply Quote 0
              • P Offline
                peter808
                last edited by

                I just read that the Intel 1000 VT NIC (I have a Dell-OEM-Version of that card) tends to make troubles on pfsense. Could that be the reason?

                On the other hand I do not understand that the NIC did work perfectly for months.

                1 Reply Last reply Reply Quote 0
                • P Offline
                  peter808
                  last edited by

                  @KOM:

                  I've never heard anything like that before.  Absolutely nothing in the System log at the time of the incident?  Doing a backup of your RRD data is disk-intensive so I would look at that first.  Saving your config has nothing at all to do with your NICs other than using your LAN NIC to send you the file.

                  That's what I have thought also. RRD-data is about 4 MB, so not that much.

                  @KOM:

                  What's a Snom?

                  VoiP-Phone of a Berlin company.

                  @KOM:

                  What's your hardware config in general?  'Siemens server' doesn't tell us much.

                  Fujitsu MX130 S2 Micro Server // 8-Core AMD Opteron 3280, 8 GB ECC RAM

                  @KOM:

                  What version of pfSense?  Do you have any IDS packages like Snort or Suricata installed?

                  latest version of pfsense, Suricata installed on all NIC-ports.

                  1 Reply Last reply Reply Quote 0
                  • KOMK Offline
                    KOM
                    last edited by

                    My experiences here over the past few years have taught me that if anything bizarre is going on, temporarily disable any IDS you have.  It might be tripping a false positive about something and blocking traffic on the NIC or something else just as bizarre.  Disable Suricata and try again.  You could also try doing a packet capture on the NIC that is down and see whats going on there.

                    1 Reply Last reply Reply Quote 0
                    • P Offline
                      peter808
                      last edited by

                      Thanks for that hint with suricata.

                      I disabled it on the correspinding NIC and now the line "survices" even a full backup, so it seems to be a got first step.

                      Oddly there had been no prio 1 entries (which block traffic) during the time when the cutoff has happened.

                      What I did find were some prio 1 entries some hours before the cutoff:

                      • ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
                      • ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 516
                      • ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 438
                      1 Reply Last reply Reply Quote 0
                      • KOMK Offline
                        KOM
                        last edited by

                        I can't really help you further with that as I tend to avoid IDS for the exact reason you're seeing – weird behaviour due to false positives.  The IDS/IPS forum may be a better place to get some guidance on what to do next.

                        1 Reply Last reply Reply Quote 0
                        • P Offline
                          peter808
                          last edited by

                          Ok, thanks, KOM, for leading me to the right direction.  ;)

                          Could a mod please move the thread?

                          1 Reply Last reply Reply Quote 0
                          • P Offline
                            peter808
                            last edited by

                            I found the solution now: it had been a problem with "inline mode" in suricata.

                            I changed it back to legacy mode and now everything is as it should be: it blocks under certain conditions, makes a log entry and cuts the connection to the offender (not the whole network).

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.