Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allowing HTTPS 443 traffic only - not working

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 4 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      So then look at your firewall log and see what's being blocked on that vlan. Are you blocking DNS as well?

      But opening port 443 for HTTPS doesnt allow HTTPS websites to load (browser) or be pinged.

      Ping aka ICMP:EchoRequest is not a tcp protocol and does not use port 443.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        Well you would also need dns to be able to resolve https://www.something.com

        And yeah trying to ping www.something.com not going to work either without icmp being allowed, and being able to resolve it unless your just wanting to ping the IP directly. Then you only need to allow icmp..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • A
          automatted
          last edited by

          Heres a screenshot of the rules on that VLAN and yes I know some are disbaled for now but thats not the issue.

          as you can see I have an allow 443 rule for the IP/alias I want to access HTTPS

          ![alt text](Screen Shot 2019-08-16 at 10.10.44 PM.png image url)

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            And there are ZERO hits on that current rule.. So no rule never triggered... What is in your camserv alias table? Look under diag

            And I guess hitting an IP, and not trying to resolve anything. Since you are not allowing dns when you had hits on your https rule

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            A 1 Reply Last reply Reply Quote 0
            • A
              automatted @johnpoz
              last edited by

              @johnpoz the alias is just one single IP

              when the alow all rule for that alias is enabled as it is now, HTTPS loads fine. when I disable that rule and enable the port 443 rule - HTTPS does not work

              so what am I missing? Do I need to do something on the WAN?

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Show the rule that DOES NOT work.

                Show the contents of the alias.

                Explain exactly where you are testing from, testing to, and exactly how you are testing.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                A 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  well when you have an ANY rule dns works for starters ;)

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  A 1 Reply Last reply Reply Quote 0
                  • A
                    automatted @Derelict
                    last edited by

                    @Derelict said in Allowing HTTPS 443 traffic only - not working:

                    Show the rule that DOES NOT work.

                    Show the contents of the alias.

                    Explain exactly where you are testing from, testing to, and exactly how you are testing.

                    The rule that does not work is shown above, its the 3rd one down.

                    The alias only has one IP of the same VLAN

                    I am testing from the IP in the alias by opening a browser and going to any HTTPS website

                    1 Reply Last reply Reply Quote 0
                    • A
                      automatted @johnpoz
                      last edited by

                      @johnpoz said in Allowing HTTPS 443 traffic only - not working:

                      well when you have an ANY rule dns works for starters ;)

                      yes the allow any rule allows https to work, but why does the 443 onlny rule not allow it to work, do I need to allow something else?

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        DNS is TCP/UDP port 53.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.