Can access web server externally, but not from LANs.



  • This post is deleted!

  • LAYER 8 Global Moderator

    You have a lot of things going on here.. I would suggested breaking it up into smaller posts and single questions that related.

    Unless you have multiple public IPs, or you want to use specific ports to access something remotely.. Your going to have to setup ha proxy to route your traffic via the actually fqdn used.

    Not sue what any of this would have to do with your dns setup on pfsense... Has nothing to do with any of your issues mentioned, orther than if your remote vpn clients can not actually query pfsense for dns?

    Lets break it up into smaller chunks and work through them.. Where do you want to start?

    What are your firewall rules currently for traffic between vlans, this could prevent client on vlan A talking to site on vlan B.. Also if your trying to hit it via a public dns that resolves to your public IP that would require nat reflection is problematic at best and should really be avoided at all cost, and just no reason to do it to be honest.

    For a client in vlan A to access a fqdn, lets call it nas.domainc.online - you would simple setup a host override in pfsense dns that your using be it the forwarder or the resolver to point to the local IP of your nas. Make sure the firewall rules allow access to the nas IP and or network.. That is all there is to it.

    Repeat that process for any other local services you want to access via some fqdn.

    Once you have that working and all your local devices can access all your local services via whatever fqdn you want to use for them.. Then you can move on to your other issues.

    Also some clarification - what is a wireless gateway? Do you mean you have a AP running there, and all your wireless devices get an IP from pfsense dhcpd, and use pfsense for dns... Or do you have some wireless router still doing nat?



  • This post is deleted!

  • LAYER 8 Netgate


  • LAYER 8 Global Moderator

    @PITS_King said in Can access web server externally, but not from LANs.:

    but I believe services like the Virtualmin UI has to be accessed via a port number (10000).

    Yeah but external that could be 443.. And that is just what webmin defaults too it could be changed to standard 443.

    No its not anywhere close to what I would consider a typical setup ;) Its just a bit much all in 1 post/question that is all over the board about multiple things at once.

    Why do you have 53 open to the public internet? Are you running an authoritative NS for some public domain, or provide dns filtering services to the public?

    25 - your running mail server to the public internet? So your IP is non residential? Is not on the dynamic IP list, you have configured the PTR for it?

    I think maybe you have stuff open to the public that doesn't need to be..

    If you did not setup tagging then they are just native lans, but lan/vlan/network/segment all pretty interchangeable terminology.

    I was unable to put it in AP mode, so it is handling DHCP on a different subnet. WiFi
    Well that is going to cause its own grief for sure.. If you want wifi, then get an AP, or use something that can be used as one.. Any wifi router can be used as just an AP.. doesn't matter what "settings" they allow for.. You connect one of its lan ports to your network, turn off its dhcp server and give it an IP on the network your connecting it too.

    And no its not a "gateway" to be honest, if did your modem and your nat then gateway... Right now you just have it in nat router mode.

    So you have 4 networks setup on pfsense.. with just any any rules.. So what is the point of segmentation?



  • This post is deleted!

  • LAYER 8 Global Moderator

    So are you running an authoritative NS? The only reason that 53 needs to be open to the public would be that or say running pfblocker something like pihole for outside your network users.

    The optimal setup for wanting to use a public fqdn that resolves to say public 1.2.3.4 IP, would be to just use a host override so your internal dns resolves it to the rfc1918 address - say this 10.0.1.4 IP.



  • @johnpoz said in Can access web server externally, but not from LANs.:

    So are you running an authoritative NS?

    963 bytes of traffic while other NAT rules already handled several GB -> so no way. Not a name server on a local LAN.
    Most ISP will block the access to port '53' - mine does. Normally, these do not have their place at an @home or 'work' network.

    Note : I guess it's a SOHO network because of the presence of a "WLAN "network.

    My first reaction was, seeing all the WAN interfaces (NAT) rules : the mstsc or RDP is missing !
    Very nice : ESXi and MySQL are listed !

    No advise from my side, but I will light a a candle for @PITS_King when I come home.


  • LAYER 8 Global Moderator

    Yeah there are lot of ports open there that shouldn't be most likely, and prob not even needed at all.

    Openvpn to server behind is going to be pain the ass to access other boxes on his network with.. He made no mention creating the routes that would be needed to do that, etc.

    Looks like he has openvpn open to pfsense, so why would you want/need to server behind?



  • This post is deleted!


  • @PITS_King said in Can access web server externally, but not from LANs.:

    I found my ISP is illegally blocking inbound SMTP on 2

    Don't feel mistreated. That happened to all of use on planet earth since ... 2005.
    Basic ISP's do not accept incoming (to you) connections to your own mail servers - and also : you can only use port "25" outgoing connections to a mail server handled by your ISP (and no other 25 mail servers).
    They finally understood that "port 25 connections" should be reserved for communication between real mail servers.
    Mail clients on your LAN(s) should use port 587 or (better) port 465 to deposit mail for transport.

    Also : the IP's used by ISP's are all listed in databases, and no serious mail server will accepts mails from these IP's because they are listed. This means : mail servers like Microsoft (MSN, Oulook, Hotmail, etc etc), gmail, Yahoo, etc etc will accept mail from your mail server.

    Do you really have a mail server running on your LAN's ? You https://www.mail-tester.com/ to send that site a test mail from your server, and checkout the results ... ^^ (did you get the 10/10 ??)

    If you really want your own mail server (and name server for your domain(s)), I advise you to rent a small VPS on the Internet.
    Then you can amuse** yourself with 'postfix' and 'bind'



  • This post is deleted!


  • This post is deleted!


  • I guess you can remove (== red) these :

    d56c057a-1017-4f65-a9f4-e5ce547d1c4d-image.png

    As you already have a - or 2 - incoming VPN connections, I advise you to remove blow up every NAT rule.
    If needed, you have access to everything from the outside, using VPN.


  • LAYER 8 Global Moderator

    @PITS_King said in Can access web server externally, but not from LANs.:

    is illegally blocking inbound SMTP on 25,

    No I don't think it can be considered illegal, as Gertjan stated pretty much all residential connections block this and even if they didn't as Gertjan also correctly goes over wouldn't do you any good, other then sending to maybe some smaller domains. All the major player will not accept mail from you anyway.

    Many home isp connections clearly state in their TOS that you are not to run servers.. So they can just not allow those ports since its in their TOS that your not suppose to do it, which you agreed to when you signed up be it you read them or not.

    Even open - your isp not going to allow you edit your PTR for your IP, and when that doesn't match the name your mail server gives when trying to send mail, would also be denied - your just some want a be spammer in their minds.. Since any real mail server would follow all the RFCs in running a mail server, etc.

    The software your running is designed to be run on a public connection... And then sure if you were running those services they would have to be open on your firewall.. But you would want or really need those open on a HOME connection..

    If I get a few minutes here today, will draw up a basic connection drawing and we can work from there on getting your services working locally. And then how to get the services you do want/need to provide to the internet that make sense and can be done realistically..

    But also as @Gertjan correctly mentions - if you want to play with some of this stuff and serving up to the public you prob better off doing that on VPS somewhere then off your local "home" connection be it mail or other services.

    Lets start with your local stuff working and accessing your local resources be a fqdn you want to use.. So if that is the case you could remove ALL of those port forwards.. Port forwards are only required for access externally not for lan to other lan access.



  • This post is deleted!

  • LAYER 8 Netgate

    What is the source address of the client you are testing from?

    What is real IP address on the server you are trying to connect to?

    What port are you trying to connect to?

    How are you testing?

    What is the result?

    How many FQDNs to the WAN address are we talking about?

    Please limit your answer to one port on one server only. Fix that and you'll probably know how to fix them all.



  • This post is deleted!

  • LAYER 8 Netgate

    What did you do with the Redirect IPv4 Gateway - Force all client-generated IPv4 traffic through the tunnel checkbox in the server configuration?

    If unchecked (or if you have set the equivalent of Don't pull routes in the client configuration) what are the Local Networks defined in your OpenVPN server.

    One issue at a time please. Please provide as much detail as possible. You have the benefit of being able to choose the first one / prioritize.



  • This post is deleted!


  • This post is deleted!

  • LAYER 8 Netgate

    If you have Redirect IPv4 Gateway checked AND you are not telling the client not to pull routes, you do not need any custom options to push any routes. You will get two routes on the client into the tunnel 0.0.0.0/1 and 128.0.0.0/1. That covers all IPv4 addresses without clobbering the client's default route. The netmask is longer (/1 is longer than /0) so those routes are preferred in the routing table over 0.0.0.0/0.

    With that in place, connect to the VPN and attempt a connection (a single connection like to http://10.0.1.4:10000/ (or https or whatever it is supposed to be).

    What, exactly, happens.

    Then go to Diagnostics > Packet Capture and set the following:

    Interface: The interface the server is on. The 10.0.1.0/24 interface
    Host: 10.0.10.0/24
    Port: 10000
    Count: 100000

    Start

    Test connecting to 10.0.1.4:10000 and let it fail

    Stop the capture. What do you see?

    If you see nothing, move the packet capture to the OpenVPN interface and do the same thing. What do you see?


  • LAYER 8 Netgate

    An aside: you should not be using Custom Options to push routes. You would use the Local Networks form field that would become visible if you unchecked Redirect IPv4 Gateway


  • LAYER 8 Global Moderator

    @PITS_King said in Can access web server externally, but not from LANs.:

    Yes, it was ruled by Congress that it is illegal for an ISP to block ANY port.

    You do understand they repealed net neutrality right ;)

    The mail server running on the Virtualmin server is only handling contact forms on a publicly visible website.

    Then you have ZERO use for an inbound 25 port..

    Internal connectivity has ZERO to do with any port forwards.. So yeah you can forget all of those.. And have arleady stated all you have to do for internal - your firewall rules already allow all traffic, so you issue of connectivity between your vlans comes down to name resolution or host firewall.



  • This post is deleted!

  • LAYER 8 Netgate

    @PITS_King said in Can access web server externally, but not from LANs.:

    Just to confirm, should I replace the 3 LAN addresses I defined in IPv4 Local Network(s) to 0.0.0.0/1 and 128.0.0.0/1 to have everything working 100%?

    It depends on what you want. There is no one answer. It's up to you.

    If it's working, no.

    If you want to push routes to the other side that tell them to send all traffic to you, check Redirect IPv4 Gateway.

    If you want to send all traffic out the OpenVPN tunnel, then that would be a Remote Network on your side instead of a Local Network Local networks push routes to clients so they send traffic to you. Remote networks add kernel routes to the local routing table that get traffic into OpenVPN to send out a tunnel.



  • This post is deleted!

  • LAYER 8 Global Moderator

    @PITS_King said in Can access web server externally, but not from LANs.:

    Then, on to getting Snort and Suricata back up and running! :-)

    So you have your internal working... I sure wouldn't start playing with those until you do, and you sure and the F do not need both.


Log in to reply