Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cant ping my netgate remotely or webgui into firewall.

    Scheduled Pinned Locked Moved General pfSense Questions
    31 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mbock @johnpoz
      last edited by

      @johnpoz Sorry let me correct myself.... We have connections via T1 at some sites, routed through BGP hitting our MPLS and back to our corp office. We also have some sites using broadband connections that we use EZVPN, setting our router as a client with a username and password for authorization.

      Yes i do understand that the current rules (any any) arn't doing anything. I only set that to try and at least be able to ping the firewall remotely. I do plan on setting rules once i can figure out how to remotely manage the firewall.

      We have over 300 remote sites all of the private subnets we use for them are extended back to our corp office and can connect to them via those private IPs.

      1 Reply Last reply Reply Quote 0
      • M
        mbock @stephenw10
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • M
          mbock @stephenw10
          last edited by

          @stephenw10 0_1539100362131_packetcapture.txt

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by stephenw10

            Sorry, I misread your post earlier. I assume 10.210.22.24 is in fact pfSense?

            And 10.210.22.1 is the Cisco router?

            Where was this capture taken, on the pfSense LAN?

            I assume you have the configured as a gateway in pfSense which is why it's pinging it at 0.5s intervals.

            What is your test client that's failing here, .209?

            20:48:09.945303 IP 10.210.22.209.49486 > 10.210.22.24.443: tcp 1
            20:48:09.945339 IP 10.210.22.24.443 > 10.210.22.209.49486: tcp 0
            

            There are no failing ARP requests shown at least. pfSense is seeing that test traffic (assuming .209) and replying via the correct interface. The actual pcap file would show if it's using the correct MAC there.

            Steve

            M 1 Reply Last reply Reply Quote 0
            • M
              mbock @stephenw10
              last edited by

              @stephenw10
              .24 is the PFSense, 10.210.22.1 is the cisco router. the .209 is the PC that i had plugged into another lan port on the PFSense so i could go into the web gui to run the packet capture. I pinged remotely from my office PC at 10.160.34.69.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Ok so there are no replies leaving the LAN (assuming it was captured on the LAN).

                Does pfSense have a route to 10.160.34.X? Via 10.210.22.1?

                It's probably sending replies via it's default route otherwise.

                Steve

                M 1 Reply Last reply Reply Quote 0
                • M
                  mbock @stephenw10
                  last edited by

                  @stephenw10

                  There isn't a route on the PFSense to 10.160.34.x , but on my cisco router 10.210.22.1 goes out VPN to our office network which has a route to this network.

                  Not sure if it helps but i ran a ping to the .209 which is the PC connected to LAN port on PFSense, and i do get replys from my 10.160.34.69 PC Remotly.
                  0_1539107007783_packetcapture2.txt

                  Here is also a pic of the routes i currently have on pfsense. 10.1.10.1 is the interface on my comcast modem.
                  0_1539107058219_routes.png

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, that's interesting.
                    You can ping the client at .209 because it's getting it's IP from the router at .1 so will be using that as it's default gateway and has a route back to 10.160 via that.

                    Normally I would expect pfSense not to unless you added a static route (we can see only the gateways not the static routes) but here you have set the LAN side gateway as default.

                    I would check the routing table in pfSense, Diag > Routes, to be sure.

                    Steve

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      mbock @stephenw10
                      last edited by

                      @stephenw10 0_1539108946270_routes.png

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Ok, should be good.

                        The default LAN pass rule will not pass that of course as LANnet does not include it.
                        You would see that traffic blocked in the firewall log though unless you have default block logging disabled.

                        Otherwise run a pcap on WAN to be sure replies are not going that way for some reason.

                        Steve

                        M 2 Replies Last reply Reply Quote 0
                        • M
                          mbock @stephenw10
                          last edited by

                          @stephenw10

                          Success!! God idk why i didn't find that earlier.... After checking the firewall log it was blocking ICMP packets to 10.210.22.24 from my remote network. Made an easy rule to allow it and now i can ping and get to the webgui remotely.

                          Thanks alot for helping me find the answer!!

                          1 Reply Last reply Reply Quote 0
                          • M
                            mbock @stephenw10
                            last edited by

                            @stephenw10

                            but now i cant get out to public internet lol... Probably firewall rule i need to allow. Calling it a day and will continue tomorrow. Thanks again

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yes, the easyrule won't cover that.

                              Easy to overlook LANnet as source in the rules 😉

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.