Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port forward on one interface incorrectly triggers forward on another

    NAT
    4
    15
    531
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      KnowledgeAddict024
      last edited by

      I found this issue when attempting to forward all outbound NTP traffic to the local NTP server on pfSense. A port forward on LAN interface forwarding all NTP traffic whose destination is NOT the LAN address, TO the LAN address, gives the intended result and the pfSense NTP server answers all queries. However, now NTP traffic entering the firewall on a completely different interface named MGMT is also forwarded to the LAN gateway IP address and is blocked by the firewall because of this. It appears that the port forward "interface" selection is not properly isolating the forward to only that interface but is also triggering on packets from other interfaces that also match the port forward conditions and changing their destination IP as well.

      Note that I have no filter rule associated with the port forward. The only applicable rules are permit rules on each interface to allow access to the local pfSense NTP server instance listening on each interface's gateway IP.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        Lets see these rule(s) you created... Lets see how you came to that conclusion.. Did you do a ! rule for this forward? Do you have some vips setup? It is a known issue that vips and ! rules can cause issues with how the rules get created.

        Lets see your actual rules - you can view the actual rules order..
        https://docs.netgate.com/pfsense/en/latest/firewall/viewing-the-full-pf-ruleset.html

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Please post your rules. Everything you have done to effect this scheme.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          K 1 Reply Last reply Reply Quote 0
          • K
            KnowledgeAddict024 @Derelict
            last edited by

            @Derelict said in Port forward on one interface incorrectly triggers forward on another:

            Please post your rules. Everything you have done to effect this scheme.

            Was my initial post too difficult to read and replicate?

            Firewall rule for LAN interface:
            Permit TCP/UDP source LAN net dest LAN address port 123

            Firewall rule for MGMT interface:
            Permit TCP/UDP source MGMT net dest MGMT address port 123

            Port forward:
            Interface LAN dest ! LAN address port NTP redirect [LAN gateway IP] port NTP

            Enabling this port forward changes the destination of NTP traffic on MGMT interface to the gateway IP address for LAN interface and the traffic is then blocked by the firewall, which shows this change in destination IP address.

            Questions? Anyone successfully replicate?

            1 Reply Last reply Reply Quote 0
            • chpalmerC
              chpalmer
              last edited by

              @KnowledgeAddict024 said in Port forward on one interface incorrectly triggers forward on another:

              Was my initial post too difficult to read and replicate?

              Dude.. attitude is everything.. Everyone here that has been helping for literally years of their life sees newer users try and come here and prove that this product has errors.. errors that nobody else besides them can find.

              We have tried to duplicate thousands (combined) of problems that people coming here have claimed with 99.9% of the time finding out that it is truly the loose nut behind the wheel.

              If you were to combine the hours and hours of free tech support that forums users give here and equate it to cost Im pretty sure that Bill Gates himself would quiver at the cost.

              If you come here with attitude.. your getting it right back at ya.

              No. Nobody has had the exact problem you have had.. that at least has been correctly displayed here and proven to be a problem. Yes is it a lot to ask that someone volunteering for free on a forum take their time to try and duplicate your issue.. though most here probably will and if they can't duplicate it will stay silent as to not corrupt the issue.. just in case they did it wrong..

              Triggering snowflakes one by one..
              Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

              K 1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Post your actual rules. Not what you think you did but what you actually did.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  You need to SHOW what you did, not say you did X... Users ALL the TIME!!! State they did X, but then when they actually show what they did it ends up being something long the lines Y+Z=Q/7

                  Post up the actual rules, I gave you the link how to do that... Are you running VIPs? How hard is a screenshot?

                  As stated I would be more than happy to try and duplicate what your doing..

                  Off the top of my head guess, is you handed client on the mgmt network the NTP of your lan IP... If your seeing blocks on the mgmt interface..

                  And lets ask again - do you have any VIPS.. Bang Rules (!) and vips don't like to play nice.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  K 1 Reply Last reply Reply Quote 0
                  • K
                    KnowledgeAddict024 @chpalmer
                    last edited by

                    @chpalmer said in Port forward on one interface incorrectly triggers forward on another:

                    @KnowledgeAddict024 said in Port forward on one interface incorrectly triggers forward on another:

                    Was my initial post too difficult to read and replicate?

                    Dude.. attitude is everything..

                    Uh oh! It's the forum nanny again!

                    If you come here with attitude.. your getting it right back at ya.

                    Why do you think you've been getting it from me, dude? You jumped to conclusions about my post in the other guy's topic and made a fool of yourself. Just gonna come here and keep it up?

                    When did I ask if anyone has had the exact problem I've had? Are you even reading my posts?

                    I can tell you're one of those easily triggered people by the way you respond. You don't even read the words typed, just assume you are getting attitude and take immediate offense on behalf of all. Way to go, keyboard warrior.

                    @chpalmer said in Port forward on one interface incorrectly triggers forward on another:

                    Yes is it a lot to ask that someone volunteering for free on a forum take their time to try and duplicate your issue.. though most here probably will and if they can't duplicate it will stay silent as to not corrupt the issue.. just in case they did it wrong..

                    So let me get this straight. You're saying that most on this forum probably will volunteer their time to duplicate the issue despite it being a lot to ask; and once they have undertaken such a monumental task, instead of reporting feedback from all their time spent, you think they will just stay silent? OK dude. If you say so.

                    The thing is, I never asked for anyone to take time and duplicate this issue. I asked IF anyone has. Big difference. Again, don't jump to conclusions. You're right about the free tech support though. In reality, Netgate is (and all of you reading this are) also getting free tech support from me right now. I'm not here looking for help. I'm here TO help. Nobody has to help solve the issue if they don't want to. I'm just here to report a problem I found for the coders to fix (you're welcome, btw.) Help fix it, or don't. No sweat off my balls either way. But if you're not going to contribute anything toward resolving the issue and are just here to white-knight for the poor defenseless users and mods who can't speak up for themselves, then maybe you should create a separate forum topic to rant in or something so as not to clog up this topic with useless nonsense. Wouldn't want to be discussing things in the wrong topic, now would we?

                    1 Reply Last reply Reply Quote 0
                    • K
                      KnowledgeAddict024 @johnpoz
                      last edited by

                      @johnpoz said in Port forward on one interface incorrectly triggers forward on another:

                      You need to SHOW what you did, not say you did X... Users ALL the TIME!!! State they did X, but then when they actually show what they did it ends up being something long the lines Y+Z=Q/7

                      No doubt that is the case. Most users are incompetent.

                      Post up the actual rules, I gave you the link how to do that...

                      pfctl -sr
                      pass in quick on vtnet1 inet proto tcp from [LAN net]/24 to [LAN interface IP] port = ntp flags S/SA keep state label "USER_RULE: Allow access to NTP server on LAN"
                      pass in quick on vtnet1 inet proto udp from [LAN net]/24 to [LAN interface IP] port = ntp keep state label "USER_RULE: Allow access to NTP server on LAN"

                      pass in quick on vtnet2 inet proto udp from <MGMT_servers> to [MGMT interface IP] port = ntp keep state label "USER_RULE: Allow MGMT servers access to local NTP"

                      pfctl -sn
                      no nat on vtnet1 inet proto tcp from (vtnet1) to [LAN interface IP] port = ntp
                      no nat on vtnet1 inet proto udp from (vtnet1) to [LAN interface IP] port = ntp
                      nat on vtnet1 inet proto tcp from [LAN net]/24 to [LAN interface IP] port = ntp -> [LAN interface IP] port 1024:65535
                      nat on vtnet1 inet proto udp from [LAN net]/24 to [LAN interface IP] port = ntp -> [LAN interface IP] port 1024:65535

                      rdr on vtnet1 inet proto tcp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                      rdr on vtnet1 inet proto udp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                      rdr on vtnet2 inet proto tcp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                      rdr on vtnet2 inet proto udp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                      rdr on vtnet3 inet proto tcp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                      rdr on vtnet3 inet proto udp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]

                      No, you cannot have the full output. As you can see, vtnet2 and vtnet3 (my DMZ net) are also getting redirect rules created by a port forward that should only be for vtnet1 (aka LAN.)

                      Are you running VIPs?

                      The only VIP is for pfb DNSBL to redirect advertising traffic to.

                      How hard is a screenshot?

                      Mildly annoying. What would you like a shot of?

                      As stated I would be more than happy to try and duplicate what your doing..

                      Off the top of my head guess, is you handed client on the mgmt network the NTP of your lan IP... If your seeing blocks on the mgmt interface..

                      Blocks only appear when port forward rule is active. If I disable it, the blocks stop because the destination IP of NTP packets coming into MGMT is no longer being modified from [MGMT interface IP] to [LAN interface IP] by the port forward which triggers the firewall alert.

                      And lets ask again - do you have any VIPS.. Bang Rules (!) and vips don't like to play nice.

                      No.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        @KnowledgeAddict024 said in Port forward on one interface incorrectly triggers forward on another:

                        The only VIP is for pfb DNSBL to redirect advertising traffic to.

                        So you do have VIPs... VIPs and ! rule not play together nice

                        rdr on vtnet2 inet proto tcp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                        rdr on vtnet2 inet proto udp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                        rdr on vtnet3 inet proto tcp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]
                        rdr on vtnet3 inet proto udp from any to ! [LAN interface IP] port = ntp -> [LAN interface IP]

                        So you created those rules!! Sorry but I just created a port forward on my lan.. And it doesn't create those. Or any other rules on any other interfaces.

                        ntpnat.jpg

                        Here are all my -sn

                        [2.4.4-RELEASE][admin@sg4860.local.lan]/root: pfctl -sn
                        no nat proto carp all
                        nat-anchor "natearly/*" all
                        nat-anchor "natrules/*" all
                        nat on ovpnc3 inet from 192.168.9.0/24 to any -> 172.27.240.2 port 1024:65535
                        nat on igb1 inet from <tonatsubnets> to any port = isakmp -> 64.53.x.x static-port
                        nat on igb1 inet6 from <tonatsubnets> to any port = isakmp -> (igb1) round-robin static-port
                        nat on igb1 inet from <tonatsubnets> to any -> 64.53.x.x port 1024:65535
                        nat on igb1 inet6 from <tonatsubnets> to any -> (igb1) port 1024:65535 round-robin
                        no rdr proto carp all
                        rdr-anchor "relayd/*" all
                        rdr-anchor "tftp-proxy/*" all
                        rdr on igb0 inet proto udp from any to ! 192.168.9.253 port = ntp -> 192.168.9.253
                        rdr on igb1 inet proto udp from <pfB_NAmerica_v4> to 64.53.x.x port = ntp -> 192.168.3.32
                        rdr on igb1 inet proto tcp from <pfB_AllowPfb_v4> to 64.53.x.x port = 23040 -> 192.168.9.10 port 32400
                        rdr-anchor "miniupnpd" all
                        [2.4.4-RELEASE][admin@sg4860.local.lan]/root: 
                        

                        No extra nats created there.. igb0 is my lan..

                        Why do you have those non nats and then nats to ALL ports?

                        Without you showing us what you have actually setup.. There is no way for us to help you figure out what you did wrong!

                        But sorry creating a port forward on LAN does not create port forwards on other interfaces... As you can clearly see from my screenshots and rule output above.

                        BTW - NTP never going to use tcp... So having that set in your rule is pointless nonsense..

                        You have pfblocker auto creating rules for you? Maybe it is doing that?

                        I changed the port forward to be udp/tcp - just to see if that could do it... And nope.. same thing.. Rule create where I created it..

                        [2.4.4-RELEASE][admin@sg4860.local.lan]/root: pfctl -sn
                        no nat proto carp all
                        nat-anchor "natearly/*" all
                        nat-anchor "natrules/*" all
                        nat on ovpnc3 inet from 192.168.9.0/24 to any -> 172.27.240.2 port 1024:65535
                        nat on igb1 inet from <tonatsubnets> to any port = isakmp -> 64.53.x.x static-port
                        nat on igb1 inet6 from <tonatsubnets> to any port = isakmp -> (igb1) round-robin static-port
                        nat on igb1 inet from <tonatsubnets> to any -> 64.53.x.x port 1024:65535
                        nat on igb1 inet6 from <tonatsubnets> to any -> (igb1) port 1024:65535 round-robin
                        no rdr proto carp all
                        rdr-anchor "relayd/*" all
                        rdr-anchor "tftp-proxy/*" all
                        rdr on igb0 inet proto tcp from 192.168.9.0/24 to ! 192.168.9.253 port = ntp -> 192.168.9.253
                        rdr on igb0 inet proto udp from 192.168.9.0/24 to ! 192.168.9.253 port = ntp -> 192.168.9.253
                        rdr on igb1 inet proto udp from <pfB_NAmerica_v4> to 64.53.x.x port = ntp -> 192.168.3.32
                        rdr on igb1 inet proto tcp from <pfB_AllowPfb_v4> to 64.53.x.x port = 23040 -> 192.168.9.10 port 32400
                        rdr-anchor "miniupnpd" all
                        [2.4.4-RELEASE][admin@sg4860.local.lan]/root: 
                        

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • K
                          KnowledgeAddict024
                          last edited by

                          First off, before I get going, I owe you, @chpalmer and everyone else on this forum a huge apology. I don't know what got into me last week. I woke up the next morning after creating this topic and realized how much of a jerk I was the night before. I've been thinking about it all week. Maybe it had something to do with the 11-hour days I've been putting in the past few weeks or because I was up so late when I was posting. I'm usually not such an arrogant bastard; but for some reason that night I let my ego get the best of me. I was that incompetent a-hole user who incorrectly assumes he is right and everyone else is wrong; and I am so sorry. It's tough sometimes to see your own faults until you screw up and express them in front of your own eyes. Unfortunately this can be hurtful to others. I know I've got some work to do on myself, starting with choosing my words much more carefully. No doubt you guys have a few choice words for me, and I deserve all of them and more. The pride and arrogance displayed in my previous comments are inexcusable; and I hope those I've hurt or offended will find it in their hearts to forgive me.

                          chpalmerC 1 Reply Last reply Reply Quote 1
                          • K
                            KnowledgeAddict024
                            last edited by

                            So here's where I need to learn to always assume I still could be an idiot (like in this case) despite being so sure in my head that I'm absolutely right. I had left pure NAT reflection mode enabled in System -> Advanced -> Firewall & NAT from a while ago when I was testing access to an external-facing web server on DMZ net from the LAN network. When I created the port forward described above, the section on NAT reflection was set to "Use system default," which caused the creation of those redirects on the other interfaces because pfSense thought I wanted all NTP traffic reflected to the LAN address. Setting the port forward's NAT reflection section to "Disable" solved the issue.

                            chpalmerC 1 Reply Last reply Reply Quote 0
                            • chpalmerC
                              chpalmer @KnowledgeAddict024
                              last edited by

                              @KnowledgeAddict024

                              Water under the bridge man. Hope I was not offensive myself!

                              Long days and no weekend sucks! Did 1600 feet of cat6 in a warehouse up high Saturday.. My loving wife told me to suck it up Sunday.. 😏

                              Triggering snowflakes one by one..
                              Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                              1 Reply Last reply Reply Quote 0
                              • chpalmerC
                                chpalmer @KnowledgeAddict024
                                last edited by

                                @KnowledgeAddict024 said in Port forward on one interface incorrectly triggers forward on another:

                                the section on NAT reflection was set to "Use system default," which caused the creation of those redirects on the other interfaces because pfSense thought I wanted all NTP traffic reflected to the LAN address. Setting the port forward's NAT reflection section to "Disable" solved the issue.

                                And I learned something new tonight. Thanks!

                                Triggering snowflakes one by one..
                                Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                                1 Reply Last reply Reply Quote 0
                                • DerelictD
                                  Derelict LAYER 8 Netgate
                                  last edited by Derelict

                                  While using pfctl to view your rule set can be a valuable tool, looking at /tmp/rules.debug can be much more straightforward. You would also have the benefits of things like comments that would immediately show you that you were looking at NAT Reflection rules.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 1
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.