VMware Workstation VMs Web Traffic Being Blocked
-
@daddygo
I agree. breaking out another system with mint/virtual box on it to test. stand by for a sec and let me build something up. -
@johnpoz said in VMware Workstation VMs Web Traffic Being Blocked:
Looking at your ciscoasa pcap - the frame sizes are sill OFF.. 1434 and 1380?
Yeah, interesting. Something is restricting the MTU there.
Also interesting is that the pcap on the VM host sees the traffic both ways with the Cisco in there.
Steve
-
While we're waiting...
Would you expect to see a block between two systems on these two vlans?
got something interesting going on here and I wonder if it is the same thing we've been seeing...
As I mentioned once before, I am a Bigfix sales engineer.
The DMZ client can ping/curl everything I would expect for the system to connect to the Bigfix management server yet I am seeing it fail.
-
What's the advanced option you have set on the LABSYSTEMS rule?
I would not expect anything blocked, do you see blocks in the firewall log?
-
@stephenw10
It's likely this, from troubleshooting:Maybe so:
-
You shouldn't need that TCP flags setting unless you have an asymmetric route and it would be a lot more broken if you did.
Those blocked packets look like the host at 10.10.0.10 sending acks after the state has closed, which is usually not an issue.
https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html#troubleshooting-blocked-log-entries-for-legitimate-connection-packets -
-
@dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:
Recommendation?
Recommendation!
https://forum.netgate.com/topic/36362/log-shows-tcp-fa-tcp-fpa-blocked-from-lan -
any chance any of you would be in for a direct troubleshooting session with me? I feel like I am burning a lot of your time and I was hoping to speed up the process for us all. If so I was thinking I can host a meeting at 11AM EST over gotomeeting if anyone is interested?
-
You can try setting the firewall optimisation to conservative in Sys > Adv > Firewall&NAT. That gives you longer state timeouts if it needs that.
I really wouldn't expect that though.
If you actually do have some asymmetry there that could explain a number of things. Why you only saw one way traffic on the VMhost NIC for example. But I would expect far more to be broken if that was the case.
Steve
-
@dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:
any chance any of you would be in for a direct troubleshooting session with me?
The truth is that we always say here that others learn from what we write here (forum) and can be retrieved for a long time.
This is why many people (member) use NoChat/NoPM in their signature -
Ok so a few updates have taken place.
First of all:
@DaddyGo
Your virtual box build idea works. All traffic all sites work. Problem is localized to the vm workstation area on that host machine.Firewall to 10.10.0.10:
Still failing to register for unknown reasons after adjusting to conservative.on the live session:
I'd be happy to do a write up from whatever we wall potentially do in this forum post. My goal was only to let you all see first hand what is happening. Happy to keep it here if that is what you all want. Obviously I do not want to ask anyone to do anything they're not comfortable with.Overall I feel like we're getting close to the answer. We know that the vm workstation virtual switching is part of the problem for sure but are still on the mystery why the Cisco ASA was able to cope and route.
This 10.10.0.10 secondary problem is interesting because that is physical > virtual connection where I have that working in a multitude of places outside of that DMZ vlan. A handful of systems are able to effectively do what that DMZ client is failing to do from both the other vlans (labsystems and default)
-
@dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:
but are still on the mystery why the Cisco ASA was able to cope and route.
I think the answer is here in the Cisco FW (RFC1191) :
+++edit:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/interface-mtu.html
-
Try to get a pcap of the failing registration session from 10.10.0.10. See what's actually happening there. Seems highly likely it will be something similar. Might be easier to see with all local traffic though.
-
@dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:
Your virtual box build idea works. All traffic all sites work. Problem is localized to the vm workstation area on that host machine.
So then you have to say that it is possible that the rumor is true and there are problems between the i219-v and VMware stuff (hypervisors)
+++edit:
Yup and you need to open a ticket for this at VMware -
Son of a gun! Based on what you were saying I dropped the hardwire lan and bumped it over to wifi (just to switch the network interface) and it worked. VM is able to navigate regularly. Color me shocked!
Ok, trying to figure out now where I go from here.
I still gotta make sure that I can VPN to the lab systems but clearly there is an issue with the hardline network. May be taking a short retail trip to get a usb network adapter just like you mentioned.
-
@dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:
Ok, trying to figure out now where I go from here.
It will be difficult because it's a laptop (vm host), hihihi
A really good quality USB adapter will help.
You rarely hear that from my mouth here on this forum++++edit:
Beware of the Realtek chip, please,....you can save a lot of crying -
Yeah nothing wants to connect to the Bigfix resources well being on Google Wifi so I think your hardline USB adapter is the place to start. I'll get my hands on that first, test, and let everyone know.
-
And just to clarify on the Cisco vs pfsense deal. The reason that the Cisco was able to cope is because of the rfc1191 that Cisco has correct? Is that something that PFSense doesn't support?
BTW thank you all for the great help, beginning to see the lights at the end of the tunnel.
-
@dfinjr said in VMware Workstation VMs Web Traffic Being Blocked:
And just to clarify on the Cisco vs pfsense deal.
Yes it looks very much like that MTU RFC1191
Cisco is my other big favorite, I've been working with them for 18 years, has a lot of small, sophisticated services for which you pay a lot afterwards
but this does nothing to dampen the greatness of pfSense,
unfortunately pfSense can't do these MTU tricks, but it is better at other things