Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can't connect to web interface when WAN is down

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    23 Posts 4 Posters 6.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dopey
      last edited by

      Interesting.  At the console, 'pfctl -d' lets me connect.  So it's definitely the firewall filtering out the connection.  I don't get it though, the anti-lockout rule is enabled but with 0/0B state.

      It seems like the firewall isn't recognizing the LAN Address destination.

      The filter log isn't showing what's blocking it either

      1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan
        last edited by

        Hi,

        Just a guess :
        Can yuo login locally (using screen/keyboard) and check if sshd (the ssh demaon) and nginx (the GUI web server) are bound to your local LAN 'pfSEnse' IP when using the 172.x.x.x ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • D
          dopey
          last edited by

          @Gertjan:

          Just a guess :
          Can yuo login locally (using screen/keyboard) and check if sshd (the ssh demaon) and nginx (the GUI web server) are bound to your local LAN 'pfSEnse' IP when using the 172.x.x.x ?

          Yeah, that was one of the first things I checked.  According to 'netstat -an' both are bound to *. <port>for both tcp4 and tcp6.  And it definitely is listening since once i disable the firewall 'pfctl -d' the client can connect no problems.</port>

          1 Reply Last reply Reply Quote 0
          • D
            dopey
            last edited by

            So I think I finally figured out what's going on.
            I have some port forwards from the router to my ssh/web server.  I added an internal redirect that does the same thing from the LAN interface to the WAN address to redirect port 22/80/443.
            I did this because when I'm connected to my work VPN I need to use their DNS server and they, obviously, don't resolve my internal hosts properly :)

            I think what's happening is when the WAN interface doesn't come up, the "WAN Address" entry gets confused :)

            If I disable this rule, then I have no problems accessing the web interface (and ssh) when the WAN is down.

            When I was previously testing it, I was only testing my router connected to a single client (without any of the other hosts on the router).  Today I had to do a router swap and actually had all my real clients in place (and i screwed up my WAN configuration so didn't get a WAN address) and ran into the same problem except that when i tried to ssh or conect to the web interface i got redirected to the port forward destination :)

            1 Reply Last reply Reply Quote 0
            • P
              PiBa
              last edited by

              It 'sounds' like a bug, rules jumping to a different interface.. Can you share what your nat rule looks like 'exactly' ? And perhaps how your wan/lan/other interfaces are assigned? ppp ? dhcp?

              I tried to reproduce the behavior but could not. Granted i tried it on 2.4beta so maybe it was fixed, or maybe i just didn't check it the right way..

              1 Reply Last reply Reply Quote 0
              • D
                dopey
                last edited by

                I'm going to reset the backup router and start from scratch on it and try adding just the Port Forward rule to see if I can reproduce it.  It's possible that it's a combination of that rule + something else I did.

                The specific rule that I disabled to allow connecting to the interface is:
                Port Forward
                Interface: LAN
                Protocol: TCP
                Source Address: *
                Source Ports: *
                Dest. Address: WAN address (not the actual IP address, but the actual "WAN address" entry)
                Dest. Ports: ExternalPorts (this is an alias declared for ports 22, 80, 443
                NAT IP: <ip address="" of="" the="" destination="" port="" forward="">NAT Ports: ExternalPorts (same alias as Dest. Ports)

                My LAN configuration is just a simple static IPv4 with IPv6 tracking the WAN interface.
                The WAN interface is a PPPoE+VLAN configuration (centurylink fiber) and ipv6 6rd tunnel.  Nothing too crazy</ip>

                1 Reply Last reply Reply Quote 0
                • D
                  dopey
                  last edited by

                  This is pretty easy to reproduce.  I just started with a fresh pfsense install.  2.3.4
                  I have nothing wired to the router except for a single laptop on the LAN port.  WAN is configured for dhcp with no cable connected, so it's "down" and has no address.

                  Added the following rule (see attached screenshot)
                  interface: lan
                  protocol: tcp
                  source address: *
                  source ports: *
                  Dest.Address: WAN address
                  Dest Port: 443
                  NAT IP: 192.168.1.12 - i picked a random address - actually it wasn't random, it was the example address on the rule page :)
                  NAT port: 443

                  I did this, applied the filter rules and within a short period of time the laptop was unable to reach the web ui.
                  From the pfsense console pfctl -d allowed me to reach it again.
                  Rebooted it and the same thing happened on the reboot.  There definitely appears to be a problem when 'WAN address' is not actually assigned.

                  If someone has 2.4 to try it'd be neat to see if it's reproducible there. If it still is I can file a bug on this.

                  forward.png_thumb
                  forward.png

                  1 Reply Last reply Reply Quote 0
                  • P
                    PiBa
                    last edited by

                    that seems to reproduce 'nicely' on 2.4beta.. The thing that did the trick to reproduce it was putting the portforward on the LAN interface.. which is i suppose a little strange, but still wouldn't have expected this result..

                    p.s. ill try and see if/how maybe it can be easily fixed..

                    1 Reply Last reply Reply Quote 0
                    • D
                      dopey
                      last edited by

                      Yeah I agree it's strange.  My real use case is a little different.  I have a DMZ interface that's accessed through the WAN address by external hosts but directly accessible via direct internal IP addresses from my LAN interface.

                      When I'm connected to VPNs where I need to use a different DNS server, I can't reach them since the hosts resolve to the WAN address.  This was a simple, low-maintenance solution to that problem :)

                      Apparently not a problem-free solution.

                      1 Reply Last reply Reply Quote 0
                      • P
                        PiBa
                        last edited by

                        made a little fix for 2.4beta.. https://github.com/pfsense/pfsense/pull/3782

                        1 Reply Last reply Reply Quote 0
                        • D
                          dopey
                          last edited by

                          Awesome.  Thank you.  I don't really know the process for how things are handled by pfsense.  Should I still open a bug in redmine on this for tracking, or if someone has a fix for it that's good enough?

                          1 Reply Last reply Reply Quote 0
                          • P
                            PiBa
                            last edited by

                            You could make a redmine ticket, and put a link to the pull-request as well there.. Personally i usually only send pull-requests on github, except for things i cant fix myself.. Sometimes its appreciated though to by the netgate guys to have a ticket anyway..

                            1 Reply Last reply Reply Quote 0
                            • D
                              dopey
                              last edited by

                              ticket filed
                              https://redmine.pfsense.org/issues/7697

                              Thanks for the help and the fix.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.