Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense block ICMP echo reply from WAN to OPT1

    Scheduled Pinned Locked Moved Firewalling
    25 Posts 4 Posters 5.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tmedtcom
      last edited by tmedtcom

      Hello,

      Pfsense block ICMP echo reply from WAN to OPT1

      MyLinux VM IP 192.168.10.99 <==> 192.168.10.1 OPT1 (pfsense) WAN 172.16.0.11 <==> 172.16.0.1 router

      Ping from 192.168.10.99 to Pfsense OPT1 192.168.10.1 => OK

      Ping from 192.168.10.99 to Router 172.16.0.1 => OK

      Ping from 192.168.10.99 to Google DNS 8.8.8.8 => Not Working

      I have make a Firewall rules to allow OPT1 Network any protocol to connect to Any IP/Protocol but problem persists

      But the replay exists:
      I made the capture of the packets in pfsense:
      11:12:06.795326 IP 172.16.0.12 > 172.16.0.1: ICMP echo request, id 3097, seq 1922, length 8
      11:12:06.798038 IP 172.16.0.1 > 172.16.0.12: ICMP echo reply, id 3097, seq 1922, length 8
      11:12:07.312546 IP 172.16.0.12 > 172.16.0.1: ICMP echo request, id 3097, seq 1923, length 8
      11:12:07.314024 IP 172.16.0.1 > 172.16.0.12: ICMP echo reply, id 3097, seq 1923, length 8

      Please Help Me !

      1 Reply Last reply Reply Quote 0
      • B
        bhjitsense
        last edited by

        First, you might want to put your router in bridge mode - hand off your public IP to your pfsense WAN interface. Second, try running packet capture on the WAN interface. It could be your ISP router blocking ICMP echo replies. Running it that way I think you are, you will have double NAT.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by johnpoz

          @tmedtcom said in Pfsense block ICMP echo reply from WAN to OPT1:

          11:12:06.795326 IP 172.16.0.12 > 172.16.0.1: ICMP echo request, id 3097, seq 1922, length 8

          You list pfsense wan as .11, why is your sniff showing from .12

          Did you setup a vip on your wan? Did you mess with outbound nat?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • T
            tmedtcom
            last edited by

            Yes Normally I have a double Nat, since I have a Cisco router that is NAT and has a single public IP WAN then I have in my VMWARE ESXI the PfSense which is NAT too.
            Does double nat not work?
            A solution?

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              double nat will work just fine.. Not optimal choice - but works for pretty much everything.. But again you state pfsense wan is .11 and your sniff of pings shows source of .12

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • B
                bhjitsense
                last edited by

                Double NAT works, unless of course it doesn't... I was just pointing that out in case you weren't aware. Have you checked the Cisco router if it's blocking the reply? Try pinging the WAN interface of the Cisco device.

                1 Reply Last reply Reply Quote 0
                • T
                  tmedtcom
                  last edited by tmedtcom

                  LAN interface 172.16.0.11

                  WAN interface 172.16.0.12

                  OPT1 interface 192.168.10.1

                  Virtual machine connected to pfsense have Ip address 192.168.10.99

                  The PFSENSE graphical interface accessible from the LAN ip 172.16.0.11

                  Also I ping from the pfsense to 8.8.8.8 it passes well through the CISCO router

                  1 Reply Last reply Reply Quote 0
                  • B
                    bhjitsense
                    last edited by

                    So pfSense can ping 8.8.8.8 but not your device at 192.168.10.99? I'm assuming you have no other connectivity issue from this device - you can browse and stuff? Is there a firewall service running in this VM?

                    1 Reply Last reply Reply Quote 0
                    • T
                      tmedtcom
                      last edited by

                      Ping from INTERNAL (OPT1) to 8.8.8.8:
                      The result:
                      0_1543325543441_pfs1.png

                      Ping from WAN to 8.8.8.8:
                      The result:
                      0_1543325622878_pfs2.PNG

                      B 1 Reply Last reply Reply Quote 0
                      • B
                        bhjitsense @tmedtcom
                        last edited by

                        @tmedtcom
                        Interface rules? Floating rules?

                        1 Reply Last reply Reply Quote 0
                        • T
                          tmedtcom
                          last edited by

                          @bhjitsense said in Pfsense block ICMP echo reply from WAN to OPT1:

                          Interface rules
                          The interface is INTERNAL (OPT1)
                          0_1543326100409_interface rules.PNG
                          FLOATING RULES/
                          0_1543326172013_FLOATING.PNG

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by johnpoz

                            @tmedtcom said in Pfsense block ICMP echo reply from WAN to OPT1:

                            LAN interface 172.16.0.11
                            WAN interface 172.16.0.12

                            What? Sorry it doesn't work that way you can not have the same network on wan and lan interface..

                            And those rules on your internal are just BORKED..

                            When would internal need to talk to pfsense to talk to other internal?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            T 1 Reply Last reply Reply Quote 0
                            • T
                              tmedtcom @johnpoz
                              last edited by

                              @johnpoz
                              LAN interface: this interface it is configured to just connecting to pfsense (ssh/web interface) just for admin.
                              WAN interface to allow users to connect to many VMs via NAT.
                              INTERNAL OPT1 this network is reserved to VMs servers on my VMware ESXI HOST.

                              B 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                And AGAIN you can not have the same network on 2 different interfaces... This basic routing 101... I don't even think pfsense will let you do that..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • B
                                  bhjitsense @tmedtcom
                                  last edited by bhjitsense

                                  @tmedtcom
                                  You don't nee the third rule if you have that first rule. Also, change the first rule to be INTERNAL net > INTERNAL address. Or ANY > INTERNAL address.

                                  Also, post your WAN rules.

                                  T 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by johnpoz

                                    WAN interface to allow users to connect to many VMs via NAT.

                                    Huh? Why would you be natting between local rfc1918 networks or vm networks?

                                    I have run pfsense on esxi for many years through multiple versions of esxi going back to 4.. Before that even ran it on the old school vmware server 1 and 2..

                                    Please draw up how you have this stuff connected in esxi with your vswitches and connected to pfsense and how your vswitches are connected to your physical network.. Port groups, are you doing any vlan tagging anywhre or different vswitches - are they standard or distributed switches, etc. etc.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    T 1 Reply Last reply Reply Quote 0
                                    • B
                                      bhjitsense
                                      last edited by

                                      My bet is on NAT being borked. You are allowing the ICMP traffic out of INTERNAL, but it doesn't know its way back for the reply.

                                      T 1 Reply Last reply Reply Quote 0
                                      • T
                                        tmedtcom @bhjitsense
                                        last edited by

                                        @bhjitsense said in Pfsense block ICMP echo reply from WAN to OPT1:

                                        @tmedtcom
                                        You don't nee the third rule if you have that first rule. Also, change the first rule to be INTERNAL net > INTERNAL address. Or ANY > INTERNAL address.

                                        Also, post your WAN rules.

                                        WAN Rules:
                                        0_1543328192521_WAN rules.PNG

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          tmedtcom @johnpoz
                                          last edited by

                                          @johnpoz said in Pfsense block ICMP echo reply from WAN to OPT1:

                                          Huh? Why would you be natting between local rfc1918 networks or vm networks?

                                          In the internal Network I have multiple web servers and in the WAN network I have a users on laptop connected to Cisco for Internet and I would like to allow users to access to my Web servers via NAT on WAN: 172.16.0.12:8080
                                          So pfsense it is the intermidiate router between 2 network 172.16.0.0/24 (WAN) and 192.168.10.0/24

                                          Also in ESXI 6.5 I have a standard virtual switch with 2 group port:

                                          • VM network bridget to phisical card
                                          • VLAN 10 => this is my Internal network
                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            tmedtcom @bhjitsense
                                            last edited by

                                            @bhjitsense said in Pfsense block ICMP echo reply from WAN to OPT1:

                                            My bet is on NAT being borked. You are allowing the ICMP traffic out of INTERNAL, but it doesn't know its way back for the reply.

                                            Yes I also see that there is no return in the logs:
                                            0_1543329183190_state ping ICMP.png
                                            But why and how to solve it?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.