Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Network cut off when doing backup

    Scheduled Pinned Locked Moved Routing and Multi WAN
    12 Posts 2 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      peter808
      last edited by

      As I did not get any response here, I restored a backup-conf and everything is fine again.

      1 Reply Last reply Reply Quote 0
      • P Offline
        peter808
        last edited by

        Fu…

        Some hours later, same problem again, now with another NIC-port.

        Could it be that the NIC has quit service?

        If so: should'nt I find any errors in the logs?

        Please give me some hints.

        1 Reply Last reply Reply Quote 0
        • KOMK Offline
          KOM
          last edited by

          I've never heard anything like that before.  Absolutely nothing in the System log at the time of the incident?  Doing a backup of your RRD data is disk-intensive so I would look at that first.  Saving your config has nothing at all to do with your NICs other than using your LAN NIC to send you the file.

          Today I tried to put some Snoms to the fourth NIC channel

          What's a Snom?  What's your hardware config in general?  'Siemens server' doesn't tell us much.  What version of pfSense?  Do you have any IDS packages like Snort or Suricata installed?

          1 Reply Last reply Reply Quote 0
          • P Offline
            peter808
            last edited by

            I just read that the Intel 1000 VT NIC (I have a Dell-OEM-Version of that card) tends to make troubles on pfsense. Could that be the reason?

            On the other hand I do not understand that the NIC did work perfectly for months.

            1 Reply Last reply Reply Quote 0
            • P Offline
              peter808
              last edited by

              @KOM:

              I've never heard anything like that before.  Absolutely nothing in the System log at the time of the incident?  Doing a backup of your RRD data is disk-intensive so I would look at that first.  Saving your config has nothing at all to do with your NICs other than using your LAN NIC to send you the file.

              That's what I have thought also. RRD-data is about 4 MB, so not that much.

              @KOM:

              What's a Snom?

              VoiP-Phone of a Berlin company.

              @KOM:

              What's your hardware config in general?  'Siemens server' doesn't tell us much.

              Fujitsu MX130 S2 Micro Server // 8-Core AMD Opteron 3280, 8 GB ECC RAM

              @KOM:

              What version of pfSense?  Do you have any IDS packages like Snort or Suricata installed?

              latest version of pfsense, Suricata installed on all NIC-ports.

              1 Reply Last reply Reply Quote 0
              • KOMK Offline
                KOM
                last edited by

                My experiences here over the past few years have taught me that if anything bizarre is going on, temporarily disable any IDS you have.  It might be tripping a false positive about something and blocking traffic on the NIC or something else just as bizarre.  Disable Suricata and try again.  You could also try doing a packet capture on the NIC that is down and see whats going on there.

                1 Reply Last reply Reply Quote 0
                • P Offline
                  peter808
                  last edited by

                  Thanks for that hint with suricata.

                  I disabled it on the correspinding NIC and now the line "survices" even a full backup, so it seems to be a got first step.

                  Oddly there had been no prio 1 entries (which block traffic) during the time when the cutoff has happened.

                  What I did find were some prio 1 entries some hours before the cutoff:

                  • ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
                  • ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 516
                  • ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 438
                  1 Reply Last reply Reply Quote 0
                  • KOMK Offline
                    KOM
                    last edited by

                    I can't really help you further with that as I tend to avoid IDS for the exact reason you're seeing – weird behaviour due to false positives.  The IDS/IPS forum may be a better place to get some guidance on what to do next.

                    1 Reply Last reply Reply Quote 0
                    • P Offline
                      peter808
                      last edited by

                      Ok, thanks, KOM, for leading me to the right direction.  ;)

                      Could a mod please move the thread?

                      1 Reply Last reply Reply Quote 0
                      • P Offline
                        peter808
                        last edited by

                        I found the solution now: it had been a problem with "inline mode" in suricata.

                        I changed it back to legacy mode and now everything is as it should be: it blocks under certain conditions, makes a log entry and cuts the connection to the offender (not the whole network).

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.