• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Upload Tests Fail - New install

Scheduled Pinned Locked Moved Firewalling
5 Posts 3 Posters 2.7k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    derrick4real
    last edited by Jan 2, 2017, 9:43 PM

    Uploads are failing when using speedtest.net (or similar) and I can't figure out why. When I disable the firewall it works.

    This is a new install with only the default firewall rules enabled. When I route traffic around pfsense or when I disable the firewall (using it as a router only) the upload test works fine.

    I thought it had something to do with dropping fragmented packets but I'm not so sure. I checked "Do-Not-Fragment compatibility" but this didn't make a difference although I don't think it's related to this.

    Wireshark capture shows packets leaving my browser are being fragmented during the upload test but no related firewall rules appear to be hit when I look at the firewall logs.

    Any ideas?

    New install (2.3.2-RELEASE-p1 (amd64)), testing with IPV4.

    Thanks!

    1 Reply Last reply Reply Quote 0
    • H
      hendersonmc
      last edited by Jan 2, 2017, 10:46 PM Jan 2, 2017, 10:15 PM

      Select the Rules item from the Firewall menu.
      Select the LAN link to display rules for your LAN
      Create a new rule at the top of your rules using the [^Add] button.
      Change Address Family to "IPv4+IPv6"
      Change Protocol to "any"
      Change Source to "LAN net"
      Type into the Description field "All LAN traffic"
      Click [SAVE]
      Click on [APPLY]

      You now have (at least) one rule that will pass traffic from home to the internet the same way most home WiFi routers operate.

      Now add two more rules.

      Create a new rule at the top of your rules using the [^Add] button.
      Change Source to "LAN net"
      Change Destination port range to "HTTP (80)"
      Type into the Description field "LAN TCP HTTP traffic"
      Click [SAVE]

      Create a new rule at the top of your rules using the [^Add] button.
      Change Protocol to "UDP"
      Change Source to "LAN net"
      Change Destination port range to "UDP (53)"
      Type into the Description field "LAN UDP DNS traffic"
      Click [SAVE]

      Click on [APPLY]

      You now have two rules appears above the "All LAN traffic" rule, so the firewall considers it first. It then passes packets matching these rules to the internet, so the "All LAN traffic" rule has fewer packets to process.

      The goal is to add rules for trusted protocols until the final rule gets only a few packets to consider. You can monitor that your rules are matching packets by looking at the label View of the pfTop diagnostic.

      You then change that rule to Block instead of Pass traffic and enable the logging feature of the rule.

      1 Reply Last reply Reply Quote 0
      • D
        derrick4real
        last edited by Jan 3, 2017, 1:38 AM

        Thanks for the response! Unfortunately, the first rule didn't make a difference.

        And I'm noticing now that a browser based chat service to which I'm connected and another app that streams tcp data constantly can't stay connected more than about a minute before timing out. When I reconnect all is well for another ~60 seconds.

        Here's my setup. I actually have three interfaces: WAN, OAM and LAN but OAM is disabled. WAN gets IP from DHCP, LAN is set statically.

        WAN has no firewall rules. LAN only has the one I posted below that came from you.

        The client I'm connecting with gets IP via DHCP with the LAN IP as the default gateway (10.0.1.2).

        One unique setup I have (although I don't know why it would matter) is that pfsense is behind another router that is the real connection to the Internet. It's setup like this while I get this configuration sorted out. So it's:

        Windows-Client: 10.0.1.73 DHCP –> PFSense: 10.0.1.2 Static LAN –> 10.0.1.214 DHCP WAN –> Router (ap-office): 10.0.1.1 Static --> Public IP

        1 Reply Last reply Reply Quote 0
        • C
          chpalmer
          last edited by Jan 3, 2017, 3:00 AM

          Your WAN and LAN appear to be the same subnet..

          That wont work.

          Triggering snowflakes one by one..
          Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

          1 Reply Last reply Reply Quote 0
          • D
            derrick4real
            last edited by Jan 4, 2017, 4:59 AM

            That was it! Funny it works fine for a while and then stops.

            I changed WAN to the actual WAN network and now all is well.

            Thanks for the help!

            1 Reply Last reply Reply Quote 0
            1 out of 5
            • First post
              1/5
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
              This community forum collects and processes your personal information.
              consent.not_received