Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New User Help! Azure Pfsense, I Can't See Website

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 2 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      JuniorNetworking @stephenw10
      last edited by JuniorNetworking

      @stephenw10
      Thank you for the reply

      Strange, it is showing the traffic I expected on the states table minus the redirect. I was expecting a destination of 192.168.0.15 then traffic gets redirected to 192.168.2.4. In the states table traffic is coming in from my public IP x.x.x.x to destination 192.168.0.15 and it is not getting redirected to 192.168.2.4. It shows to be connected on port 80 in the states table. I replaced the three octets with x for privacy on the public IP:

      4eea50e0-ae74-45c8-b102-7850147c85a3-image.png

      States:

      fa7fc93a-1911-4403-b29d-fdcb0e71df9d-image.png

      Also, I changed the LAN interface from DHCP to static, added the IP 192.168.1.4, and removed the gateway.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        Ah, it's probably not matching because your port forward rule is set to catch traffic with destination 52.x.x.x. But by the time it reaches pfSense it has been forwarded by Azure to 192.168.0.15 so that needs to be the destination in the pfSense rule.

        Steve

        J 1 Reply Last reply Reply Quote 0
        • J
          JuniorNetworking @stephenw10
          last edited by JuniorNetworking

          @stephenw10

          It is now redirecting correctly, 192.168.2.4 :80 (192.168.0.15) <--(Original Destination), but I am not getting any traffic through: 4a91b823-5a87-48fe-9507-e33e569b66af-image.png

          Here are my two rules to permit traffic on port 80 in Pfsense:328fabf1-385d-4d24-b522-9cdedf2062f5-image.png

          Here are my Inbound Rules in Azure, same Network Security Group, different NICs (I double checked this):
          2cb3e609-b67e-4cbc-a00e-a878499095b4-image.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Local firewall on the server blocking it? There are zero bytes coming back there.

            Steve

            1 Reply Last reply Reply Quote 0
            • J
              JuniorNetworking
              last edited by

              I added an Inbound rule to the firewall but it still didn't allow me to see the website. 8a1bb380-d082-47c7-8f15-de7569b2f9f4-image.png

              I tried removing the local firewall completely, but I was unable to see the site. I removed the Public IP from the Pfsense NIC associated to IP 192.168.0.15 and placed it directly on the Website NIC in Azure192.168.2.4 and turned the firewall back on and was able to see the site but it is not going through Pfsense anymore :(

              I am removing the association and putting it public IP back on the Pfsesense NIC IP with 192.168.0.15

              Here are my firewall rules on Pfsesense and Azure:
              Here are my two rules to permit traffic on port 80 in Pfsense WAN interface ( I have not added any rules to the LAN interface):328fabf1-385d-4d24-b522-9cdedf2062f5-image.png

              Here are my Inbound Rules in Azure, same Network Security Group, for all NICs (I double checked this):
              2cb3e609-b67e-4cbc-a00e-a878499095b4-image.png

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by stephenw10

                Is the server using the pfSense LAN as it's default gateway? Or being routed there by Azure?

                Without that the server may be replying directly and you get out of state TCP blocks. (asymmetric routing)

                Steve

                J 1 Reply Last reply Reply Quote 0
                • J
                  JuniorNetworking @stephenw10
                  last edited by

                  @stephenw10
                  I don't think it is. Is the best way to do that by changing the NIC adapter settings or should I make a static route in Azure?
                  528687e8-ca9d-42e5-a44f-63ecf9172231-image.png

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Better to route it in Azure otherwise you have to add that to all VMs there. It;s unclear if you actually have two subnets there though. It looks like you might just be using "Azure Network Space: 192.168.0.0/22". That could make the routing difficult, you might have to static route on the server.

                    Steve

                    J 1 Reply Last reply Reply Quote 0
                    • J
                      JuniorNetworking @stephenw10
                      last edited by

                      @stephenw10
                      I made three subnets out of a possible four from the address space 192.168.1.0/22.
                      192.168.0.x/24
                      192.168.1.x/24
                      192.168.2.x/24
                      I felt that it might be a good idea so I can later add a static route if necessary :)

                      I tried adding a route to Azure: Address Prefix: 192.168.0.0/24 Next Hop: 192.168.1.4 Associated Subnet: 192.168.2.0/24, but I had no luck

                      I added static route in cmd route add -p 192.168.0.0 MASK 255.255.255.0 192.168.1.4, but still nothing :(

                      I even tried it after killing the session states

                      cdbd1d21-43a4-49d9-9e71-57e890b2ae72-image.png

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        The route you need to add is 0.0.0.0/0 via 192.168.1.4. That will allow the server to route back to any external client via pfSense.

                        But you need to apply that to only devices in 192.168.1.0/24 and you might not be able to do that in Azure unless you really have separate subnets.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • J
                          JuniorNetworking
                          last edited by JuniorNetworking

                          I went ahead and tried it anyway, it being add the VM to the 192.168.1.0/24 subnet. I made the VM IP 192.168.1.5 and tried creating a static route via cmd for 0.0.0.0 MASK 0.0.0.0 192.168.1.4. It didn't seem to work. I tried it in Azure as a static route but I found that Azure can only route between different subnets.

                          Sorry, I am so confused :( ??? Why does the LAN interface subnet need to contain the website VM? Azure will not let me route through that 192.168.1.4 IP if my VM is in the same subnet (192.168.1.5)

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Replies from the server must go back through pfSense. Otherwise the firewall will only see part of the TCP conversation and will block out of state packets. Check the firewall log.

                            The only other way to do it is to NAT the traffic as it leaves LAN so the server replies back to that directly as it's in the same subnet.

                            Steve

                            J 1 Reply Last reply Reply Quote 1
                            • J
                              JuniorNetworking @stephenw10
                              last edited by JuniorNetworking

                              @stephenw10
                              Holy Moley! That worked! You are the best, thank you!!! Switching IPs to the same subnet as the LAN then creating route 0.0.0.0/0 next hop 192.168.1.4 to subnet 192.168.1.0/24 in Azure worked like a charm!

                              Thanks again! :)

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                No worries. 👍

                                1 Reply Last reply Reply Quote 1
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.