Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSense [RST, ACK] packet when accessing a site

    Scheduled Pinned Locked Moved General pfSense Questions
    28 Posts 5 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      Are you running behind a proxy like squid? Which packages, if any, do you have installed? It works fine for me both with and without squid.

      R 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        If the site sends you RST not much pfsense can do about that.. If your running through proxy - could be detecting that and blocking you.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Are you load-balancing those ISPs? I haven't seen it for a while but some older sites use to reject connections from multiple IPs when you do that. I used to maintain a list of IPs to policy route directly to to avoid that.
          But it looks like the site ACKs your hello and then your client doesn't send anything for 4s.

          Steve

          R 1 Reply Last reply Reply Quote 0
          • R
            rjabellax5 @KOM
            last edited by

            @KOM said in PFSense [RST, ACK] packet when accessing a site:

            Are you running behind a proxy like squid? Which packages, if any, do you have installed? It works fine for me both with and without squid.

            No, I'm not running behind a proxy. These are the packages installed on my system:
            Captureddddeee.PNG

            1 Reply Last reply Reply Quote 0
            • R
              rjabellax5 @stephenw10
              last edited by

              @stephenw10 I only have two ISPs. I have set it up to only failover using gateway groups.

              1 Reply Last reply Reply Quote 0
              • R
                rjabellax5
                last edited by

                Correction on my post, I still cant access the site when directly connected to ISP modem. Even without NAT, my laptop uses public IP, I still cant access the site. I may have to contact the site's network admin.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Ah, Ok. That would be hard to solve in pfSense then! ๐Ÿ˜‰

                  4 1 Reply Last reply Reply Quote 0
                  • 4
                    4o4rh @stephenw10
                    last edited by

                    Hey guys,

                    i have a freenas jail with weewx listening on port 8000. it sits on the server vlan.
                    the weather station client sits on the client vlan.

                    i am seeing the same thing when i capture from pfsense.

                    if i connect the weather station to a ubuntu server on the same vlan, i do not have this problem. However, in this case the client (wifi) is connected to a managed switch so would bypass pfsense.

                    In other words, i can't rule out pfsense nor clearly the freenas server/jail.

                    given freenas and pfsense are both freebsd, can you give me some direction on how i can ensure it is not the freenas jail or pfsense causing this please.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      What exactly are you seeing?

                      The server sends RST?

                      Most likely it's configured not to accept connections from outside it's subnet.

                      Steve

                      4 1 Reply Last reply Reply Quote 0
                      • 4
                        4o4rh @stephenw10
                        last edited by

                        @stephenw10 captured on pfsense, the RST, ACK is marked red.

                        22 2.968670 WH2900C WEEWX TCP 58 20150 โ†’ 8080 [SYN] Seq=0 Win=5840 Len=0 MSS=1460
                        23 2.969709 WEEWX WH2900C TCP 54 8080 โ†’ 20150 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0]

                        I have ping to each other from each system. both lie in different VLANs

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Right, it's refusing the connection. Nothing to do with pfSense which is routing it correctly.

                          Since it's sending a RST rather then just dropping the traffic it's probably a server config issue but it could be a local firewall on the server.

                          Steve

                          4 1 Reply Last reply Reply Quote 0
                          • 4
                            4o4rh @stephenw10
                            last edited by

                            @stephenw10 i am not so strong with freebsd. can you offer some advice on commands that could help in identifying the cause pls

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              You will need check whatever you have WeeWX running on. The server config there is the first place I would look.
                              Could be something in FreeNAS rejecting it.

                              To prove it you could add an outbound NAT rule in pfSense so traffic appears to be coming from the same subnet. If you can then access it you know it's a server side problem.

                              Steve

                              4 1 Reply Last reply Reply Quote 0
                              • 4
                                4o4rh @stephenw10
                                last edited by

                                @stephenw10 so you mean like?

                                src Port Dst Port NAT Port
                                WH2900C 8000 WEEWX 8000 SRV_Address *

                                thx

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  If SRV_Address is the interface address on the VLAN where the server is.

                                  You need an outbound NAT rule not a port forward.

                                  Steve

                                  johnpozJ 4 2 Replies Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @stephenw10
                                    last edited by

                                    When you see a RST internally, its almost always going to be the OS of the device your trying to talk to. A firewall like pfsense, normally would never send a RST.. Unless you have a real specific rule setup to "reject" Which you really would rarely want on wan side. Internally such rules can be useful..

                                    There some special use cases for reject on wan. If you want it to answer for traceroute for example is one that comes to mind. But normally a RST means you talked to OS, or OS firewall.. Since normally a firewall between you and your end device wouldn't send RST for traffic it doesn't allow. Default is normally to just drop traffic that is not allowed.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    4 1 Reply Last reply Reply Quote 0
                                    • 4
                                      4o4rh @stephenw10
                                      last edited by 4o4rh

                                      @stephenw10 so check "do not NAT"? like below?

                                      Interface 	Source 	Source Port 	Destination 	Destination Port 	NAT Address 	NAT Port 	Static Port 	Description 	Actions
                                        	VLAN_2_INTERN 	192.168.2.5/32 	8000 	192.168.4.7/32 	8000 	NO NAT		* 		TEST WEEWX Rule
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • 4
                                        4o4rh @johnpoz
                                        last edited by

                                        @johnpoz thanks to you and steve for the clarification. freenas is freebsd.

                                        how can i establish what on the box is causing it?
                                        e.g. ip tables, etc?

                                        can you offer some commands i could use to validate pls

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @4o4rh
                                          last edited by johnpoz

                                          No what stephenw10 is talking about is a source nat to get around rules that might stop traffic to a device, where the traffic is from another network.

                                          server is on vlanX 192.168.1.100 for example, and you want to talk to it from device on vlanY 192.168.2.200 for example.

                                          If 1.100 does not allow access to its services, because of firewall, or lack of gateway for example. You can do a outbound, or source nat to trick the 1.100 device to think the traffic came from pfsense IP in vlanX, say 192.168.1.1

                                          This is outbound nat, set on the vlanX interface to set the source of the traffic to pfsense IP address in that interface. Here is example I have setup to talk to 9.101 device on my network because it has no gateway. So to the device when I talk to it from my vpn... It thinks the traffic came from pfsense IP address 9.253

                                          outboundnat.png

                                          I would not suggest this, unless the reason you can not talk to the device is no gateway.. You need to adjust the firewall on the device your trying to talk to allow traffic from where your talking from.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Yes, that ^.

                                            But, also yes, you can use that to prove where the problem is but you should fix it at the root which is probably the server config or some rule in the FreeNAS networking.

                                            Steve

                                            4 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.