• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

TCP:RA, TCP:A, TCP:PA blocked ?

Scheduled Pinned Locked Moved Firewalling
10 Posts 3 Posters 26.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L
    lbm_
    last edited by lbm_ Jul 7, 2018, 12:09 PM Jul 7, 2018, 12:08 PM

    Hi Guys,

    I have an pfsense box with 3 NICS. WAN,LAN and DMZ. The traffic works as intended, and so does the rules. But after some time, I get disconnected (LAN->DMZ traffic), with TCP:RA,A,PA showed in the firewall logs in pfsense.

    From WAN -> DMZ I have no issues...

    2_1530965232623_Capture.PNG

    Rules LAN
    1_1530965232622_Capture2.PNG
    Rules DMZ
    0_1530965232622_Capture3.PNG

    I've tried to set the firewall options to conservative, like described here, with not much luck: https://knowledge.zomers.eu/pfsense/Pages/How-to-solve-connectivity-issues-with-dropped-RA-and-PA-packets.aspx

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz Jul 7, 2018, 1:43 PM Jul 7, 2018, 1:41 PM

      Those sorts of blocks are normally a sign of asymmetrical traffic.

      Or you could have dupe packets... You understand that first hit you show is RA, or RESET ACK... This basically the client saying F OFF done.. FA would be way to normally close a tcp session. But RA is can be seen sometimes depending on how the client/application is designed..

      Are these devices wireless?

      Once a state is closed, then yeah any other packets that are not SYN would be blocked. A firewall only creates a state with the start of a conversation.. Ie the handshake syn, syn/ack

      So if firewall sees Fin and closes the state, then any other packets still being seen would be out of state and blocked.

      https://www.netgate.com/docs/pfsense/firewall/troubleshooting-blocked-log-entries-for-legitimate-connection-packets.html

      How exactly do you have these networks wired? Are they physical isolated with different switches, do devices use different gateways than pfsense IP? Are you using a dumb switch to try and isolate your vlans - maybe you have your vlans on your switch misconfigured and are running multiple layer 3s on the same layer 2?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 1
      • L
        lbm_
        last edited by Jul 13, 2018, 10:49 PM

        Hi,
        Thanks for the reply.

        No its not wireless devices. Actually the wireless devices seams to work fine. the issue seems to be only with wired devices.

        The network look like this.

        Switch1 - Unmanaged
        Switch2 - Unmanaged
        Switch3 - Managed

        PFSense has 3 NICs, (and a WLAN). WAN,LAN,DMZ.

        PFSense(DMZ)<->Server(DMZ)
        PFSense(WAN)<->Internet
        PFSense(LAN )<->Switch2, for switch it spans to further switches.

        Workstation<->Switch1<->Switch2<->PFsense(LAN)
        Switch1<->Switch3<->Server(LAN)

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by Jul 14, 2018, 10:59 AM

          If you wan tto work with vlans then you need a smart switch... Your dumb switch can be downsream of your smart switch and then all devices on those dumb switch would have to be on the same vlan..

          Your switch 3 needs to be directly connected to pfsense and you can run vlans on those ports, then downstream from switch 3 you can put your dumb switches on any vlan you want.. But all devices on that dumb switch will be on the same vlan.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • L
            lbm_
            last edited by Jul 14, 2018, 1:18 PM

            Yes im aware, and thats really not the case. I only use the VLAN for IOT, so its still kinda a mystery to be why this happens. Maybe it would help if I enable "Bypass firewall rules for traffic on the same interface" ?

            The network look like this.
            So if I go to the DMZ interface to the server, from the WS. (WS->SW1->SW2->PFSense->Server), I will get disconnected suddently, with the error from the first post.

            If I go to the LAN interface on the server, I will not have this issue (traffic should never go through PFSense in that case. (WS->SW1->SW3->Server).
            0_1531574301017_simple (1).png

            1 Reply Last reply Reply Quote 1
            • J
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz Jul 15, 2018, 10:21 AM Jul 15, 2018, 10:18 AM

              You can not do that... And you have your server connected to 2 different networks.. Both with default routes I take it.. So you talk to server from lan to dmz.. He talks back via his lan connection. ASYMMETRICAL!! Now you have problems with states on the firewall.

              How exactly is that IOT stuff being on a vlan? Doesn't work that way..

              Is your sw3 L3 and routing? If so then your lan needs to be transit network and not have hosts on it.. Because how do they get to the vlan network without talking to their gateway on pfsense? Which causes hairpin and asymmetrical traffic, etc.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • L
                lbm_
                last edited by Jul 16, 2018, 8:10 AM

                Oh, I see! Thx!

                There is only 1 route configured on the server (default route), which is towards the LAN connection..
                I thought it would take the same route back it came from, unless an route told it otherwise. :)

                K 1 Reply Last reply Jul 16, 2018, 9:31 AM Reply Quote 0
                • K
                  kpa @lbm_
                  last edited by Jul 16, 2018, 9:31 AM

                  @lbm_ said in TCP:RA, TCP:A, TCP:PA blocked ?:

                  Oh, I see! Thx!

                  There is only 1 route configured on the server (default route), which is towards the LAN connection..
                  I thought it would take the same route back it came from, unless an route told it otherwise. :)

                  Every node in a network does their routing 100% autonomously without consulting anyone else and routing is always stateless meaning there is no memory of the previous packets that arrived or if they were part of an active connection or not.

                  1 Reply Last reply Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator
                    last edited by Jul 16, 2018, 11:05 AM

                    Even if you have only 1 default route. When I see traffic from 192.168.x and I have an an interface in 192.168.x - then that is where you respond with.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    L 1 Reply Last reply Jul 16, 2018, 8:57 PM Reply Quote 0
                    • L
                      lbm_ @johnpoz
                      last edited by Jul 16, 2018, 8:57 PM

                      @johnpoz said in TCP:RA, TCP:A, TCP:PA blocked ?:

                      Even if you have only 1 default route. When I see traffic from 192.168.x and I have an an interface in 192.168.x - then that is where you respond with.

                      Thx, it makes sense. :)

                      Are there any way to solve this ? Its not an big issue at all, im just curious.

                      1 Reply Last reply Reply Quote 0
                      • S serbus referenced this topic on Dec 26, 2021, 3:00 PM
                      • S serbus referenced this topic on Dec 26, 2021, 3:00 PM
                      • S serbus referenced this topic on Dec 26, 2021, 3:01 PM
                      • S serbus referenced this topic on Dec 26, 2021, 3:01 PM
                      • E Elmojo referenced this topic on Dec 26, 2021, 5:39 PM
                      • E Elmojo referenced this topic on Dec 26, 2021, 5:39 PM
                      • bingo600B bingo600 referenced this topic on May 22, 2022, 1:41 PM
                      10 out of 10
                      • First post
                        10/10
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received