Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cant ping my netgate remotely or webgui into firewall.

    Scheduled Pinned Locked Moved General pfSense Questions
    31 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by stephenw10

      Sorry, I misread your post earlier. I assume 10.210.22.24 is in fact pfSense?

      And 10.210.22.1 is the Cisco router?

      Where was this capture taken, on the pfSense LAN?

      I assume you have the configured as a gateway in pfSense which is why it's pinging it at 0.5s intervals.

      What is your test client that's failing here, .209?

      20:48:09.945303 IP 10.210.22.209.49486 > 10.210.22.24.443: tcp 1
      20:48:09.945339 IP 10.210.22.24.443 > 10.210.22.209.49486: tcp 0
      

      There are no failing ARP requests shown at least. pfSense is seeing that test traffic (assuming .209) and replying via the correct interface. The actual pcap file would show if it's using the correct MAC there.

      Steve

      M 1 Reply Last reply Reply Quote 0
      • M
        mbock @stephenw10
        last edited by

        @stephenw10
        .24 is the PFSense, 10.210.22.1 is the cisco router. the .209 is the PC that i had plugged into another lan port on the PFSense so i could go into the web gui to run the packet capture. I pinged remotely from my office PC at 10.160.34.69.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Ok so there are no replies leaving the LAN (assuming it was captured on the LAN).

          Does pfSense have a route to 10.160.34.X? Via 10.210.22.1?

          It's probably sending replies via it's default route otherwise.

          Steve

          M 1 Reply Last reply Reply Quote 0
          • M
            mbock @stephenw10
            last edited by

            @stephenw10

            There isn't a route on the PFSense to 10.160.34.x , but on my cisco router 10.210.22.1 goes out VPN to our office network which has a route to this network.

            Not sure if it helps but i ran a ping to the .209 which is the PC connected to LAN port on PFSense, and i do get replys from my 10.160.34.69 PC Remotly.
            0_1539107007783_packetcapture2.txt

            Here is also a pic of the routes i currently have on pfsense. 10.1.10.1 is the interface on my comcast modem.
            0_1539107058219_routes.png

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Hmm, that's interesting.
              You can ping the client at .209 because it's getting it's IP from the router at .1 so will be using that as it's default gateway and has a route back to 10.160 via that.

              Normally I would expect pfSense not to unless you added a static route (we can see only the gateways not the static routes) but here you have set the LAN side gateway as default.

              I would check the routing table in pfSense, Diag > Routes, to be sure.

              Steve

              M 1 Reply Last reply Reply Quote 0
              • M
                mbock @stephenw10
                last edited by

                @stephenw10 0_1539108946270_routes.png

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Ok, should be good.

                  The default LAN pass rule will not pass that of course as LANnet does not include it.
                  You would see that traffic blocked in the firewall log though unless you have default block logging disabled.

                  Otherwise run a pcap on WAN to be sure replies are not going that way for some reason.

                  Steve

                  M 2 Replies Last reply Reply Quote 0
                  • M
                    mbock @stephenw10
                    last edited by

                    @stephenw10

                    Success!! God idk why i didn't find that earlier.... After checking the firewall log it was blocking ICMP packets to 10.210.22.24 from my remote network. Made an easy rule to allow it and now i can ping and get to the webgui remotely.

                    Thanks alot for helping me find the answer!!

                    1 Reply Last reply Reply Quote 0
                    • M
                      mbock @stephenw10
                      last edited by

                      @stephenw10

                      but now i cant get out to public internet lol... Probably firewall rule i need to allow. Calling it a day and will continue tomorrow. Thanks again

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Yes, the easyrule won't cover that.

                        Easy to overlook LANnet as source in the rules 😉

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.