Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New User Help! Azure Pfsense, I Can't See Website

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 2 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      JuniorNetworking
      last edited by

      I added an Inbound rule to the firewall but it still didn't allow me to see the website. 8a1bb380-d082-47c7-8f15-de7569b2f9f4-image.png

      I tried removing the local firewall completely, but I was unable to see the site. I removed the Public IP from the Pfsense NIC associated to IP 192.168.0.15 and placed it directly on the Website NIC in Azure192.168.2.4 and turned the firewall back on and was able to see the site but it is not going through Pfsense anymore :(

      I am removing the association and putting it public IP back on the Pfsesense NIC IP with 192.168.0.15

      Here are my firewall rules on Pfsesense and Azure:
      Here are my two rules to permit traffic on port 80 in Pfsense WAN interface ( I have not added any rules to the LAN interface):328fabf1-385d-4d24-b522-9cdedf2062f5-image.png

      Here are my Inbound Rules in Azure, same Network Security Group, for all NICs (I double checked this):
      2cb3e609-b67e-4cbc-a00e-a878499095b4-image.png

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        Is the server using the pfSense LAN as it's default gateway? Or being routed there by Azure?

        Without that the server may be replying directly and you get out of state TCP blocks. (asymmetric routing)

        Steve

        J 1 Reply Last reply Reply Quote 0
        • J
          JuniorNetworking @stephenw10
          last edited by

          @stephenw10
          I don't think it is. Is the best way to do that by changing the NIC adapter settings or should I make a static route in Azure?
          528687e8-ca9d-42e5-a44f-63ecf9172231-image.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Better to route it in Azure otherwise you have to add that to all VMs there. It;s unclear if you actually have two subnets there though. It looks like you might just be using "Azure Network Space: 192.168.0.0/22". That could make the routing difficult, you might have to static route on the server.

            Steve

            J 1 Reply Last reply Reply Quote 0
            • J
              JuniorNetworking @stephenw10
              last edited by

              @stephenw10
              I made three subnets out of a possible four from the address space 192.168.1.0/22.
              192.168.0.x/24
              192.168.1.x/24
              192.168.2.x/24
              I felt that it might be a good idea so I can later add a static route if necessary :)

              I tried adding a route to Azure: Address Prefix: 192.168.0.0/24 Next Hop: 192.168.1.4 Associated Subnet: 192.168.2.0/24, but I had no luck

              I added static route in cmd route add -p 192.168.0.0 MASK 255.255.255.0 192.168.1.4, but still nothing :(

              I even tried it after killing the session states

              cdbd1d21-43a4-49d9-9e71-57e890b2ae72-image.png

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                The route you need to add is 0.0.0.0/0 via 192.168.1.4. That will allow the server to route back to any external client via pfSense.

                But you need to apply that to only devices in 192.168.1.0/24 and you might not be able to do that in Azure unless you really have separate subnets.

                Steve

                1 Reply Last reply Reply Quote 0
                • J
                  JuniorNetworking
                  last edited by JuniorNetworking

                  I went ahead and tried it anyway, it being add the VM to the 192.168.1.0/24 subnet. I made the VM IP 192.168.1.5 and tried creating a static route via cmd for 0.0.0.0 MASK 0.0.0.0 192.168.1.4. It didn't seem to work. I tried it in Azure as a static route but I found that Azure can only route between different subnets.

                  Sorry, I am so confused :( ??? Why does the LAN interface subnet need to contain the website VM? Azure will not let me route through that 192.168.1.4 IP if my VM is in the same subnet (192.168.1.5)

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Replies from the server must go back through pfSense. Otherwise the firewall will only see part of the TCP conversation and will block out of state packets. Check the firewall log.

                    The only other way to do it is to NAT the traffic as it leaves LAN so the server replies back to that directly as it's in the same subnet.

                    Steve

                    J 1 Reply Last reply Reply Quote 1
                    • J
                      JuniorNetworking @stephenw10
                      last edited by JuniorNetworking

                      @stephenw10
                      Holy Moley! That worked! You are the best, thank you!!! Switching IPs to the same subnet as the LAN then creating route 0.0.0.0/0 next hop 192.168.1.4 to subnet 192.168.1.0/24 in Azure worked like a charm!

                      Thanks again! :)

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        No worries. 👍

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.