• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Port firewalled automatically

Scheduled Pinned Locked Moved Firewalling
7 Posts 2 Posters 594 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    murdof
    last edited by Sep 1, 2020, 9:21 AM

    Hi guys,

    I have a PBX sending SMDR (phone call logs) to a TCP port on a Linux box (using nc to read the logs) over IPSEC.

    This works OK but after a while the port starts getting blocked by the "default firewall rule". Even if I go and manually explicitly allow the port it still gets blocked (by the way I have rule to allow all IPSEC traffic).

    If I change the port to send the data to, then everything starts working again OK (don't need to change any rules because as I said all the IPSEC traffic is allowed by default)

    Could there be a setting somewhere that blocks the port due to the continuous flow of data?

    Thanks!

    1 Reply Last reply Reply Quote 0
    • K
      kiokoman LAYER 8
      last edited by Sep 1, 2020, 5:33 PM

      no,
      more likely trouble on your smdr
      what you see on the firewall log are probably packet arriving after the connection’s state has been removed

      ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
      Please do not use chat/PM to ask for help
      we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
      Don't forget to Upvote with the 👍 button for any post you find to be helpful.

      1 Reply Last reply Reply Quote 0
      • M
        murdof
        last edited by Sep 1, 2020, 7:21 PM

        Hmmm....

        Data is not flowing though.
        And even if I reboot the Linux box and the Avaya PBX data flow is not restored.
        I need to go and change the port on PBX and on nc in Linux...

        1 Reply Last reply Reply Quote 0
        • K
          kiokoman LAYER 8
          last edited by Sep 2, 2020, 7:24 AM

          copy here the firewall logs,

          try with
          Go to System > Advanced
          Click Firewall & NAT
          Set ‘Firewall Optimization Options’ to Conservative

          ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
          Please do not use chat/PM to ask for help
          we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
          Don't forget to Upvote with the 👍 button for any post you find to be helpful.

          1 Reply Last reply Reply Quote 0
          • M
            murdof
            last edited by murdof Sep 8, 2020, 7:49 AM Sep 8, 2020, 7:45 AM

            Hi,

            Sorry for taking a while to reply. Was waiting for the problem to reappear...

            here is what I see in the logs:
            Sep 8 10:13:09 IPsec Default deny rule IPv4 (1000000101) 192.168.2.50:4238 192.168.8.5:1936 TCP:A
            Sep 8 10:13:19 IPsec Default deny rule IPv4 (1000000101) 192.168.2.50:4238 192.168.8.5:1936 TCP:A
            Sep 8 10:13:29 IPsec Default deny rule IPv4 (1000000101) 192.168.2.50:4238 192.168.8.5:1936 TCP:A
            Sep 8 10:13:39 IPsec Default deny rule IPv4 (1000000101) 192.168.2.50:4238 192.168.8.5:1936 TCP:A
            Sep 8 10:13:49 IPsec Default deny rule IPv4 (1000000101) 192.168.2.50:4238 192.168.8.5:1936 TCP:A
            Sep 8 10:13:59 IPsec Default deny rule IPv4 (1000000101) 192.168.2.50:4238 192.168.8.5:1936 TCP:A

            And here are my firewall rules for IPSec interface:
            de6f53d3-dfe4-4811-96d6-e9ff41bb6904-image.png

            I added the first line to explicitly allow the TCP 1936 port but it gets ignored

            Note that the logs just keep filing with lines like this every 10 seconds - so it means that the PBX is actively trying to send the data.

            I changed the Firewall Optimization Options to Conservative and rebooted pfsense but didn't fix it.

            In the past I had port 1935 setup and it was working for 2-3 days. Then it stopped and moved to port 1936 but again it stopped. Now I changed the port back to 1935 (which was blocked) and it works again. So it seems something is blocking the ports for a specific period. If traffic stops on that port - then it starts working again.

            1 Reply Last reply Reply Quote 0
            • K
              kiokoman LAYER 8
              last edited by kiokoman Sep 8, 2020, 9:17 AM Sep 8, 2020, 9:16 AM

              is 192.168.50.0/24 the ip of the ipsec interface?
              what's 11.0.0.0/16 ? does it generate traffic on the same interface?

              something is wrong
              maybe you have something on the floating tab?
              remember that floating rules and NAT rules have precedence over firewall rules
              the first rule overlap the second rule, and state say 0/0 so it was never used
              a complete screenshots is needed to understand , if you have sensitive data just edit the image and delete ip from it

              ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
              Please do not use chat/PM to ask for help
              we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
              Don't forget to Upvote with the 👍 button for any post you find to be helpful.

              1 Reply Last reply Reply Quote 0
              • M
                murdof
                last edited by Sep 8, 2020, 10:08 AM

                I have 3 sites:
                Office: 192.168.2.0/24
                Hetzner servers: 192.168.8.0/24
                Azure servers: 11.0.0.0/16

                The PBX is located in the Office: 192.168.2.50
                It is trying to write data to the Hetzner network and a Linux box running in: 192.168.8.0/24 (192.168.8.5 specifically)

                The only floating ones I have are from Ban Lists on PFfBlockerNG and as you see they affect the WAN interface not the IPSec one:
                aafbe7b8-13d7-45cf-af25-49532b608a10-image.png

                You are right about overlaps, that's what I assumed that the first one is prioritised and it shouldn't be 0/0 - but it seems that the IPsec rules are overridden. The traffic is purely over the IPSec network though as you see both are private range IPs (192.168.2.50 and 192.168.8.5)

                1 Reply Last reply Reply Quote 0
                7 out of 7
                • First post
                  7/7
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                  This community forum collects and processes your personal information.
                  consent.not_received