Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense sees NATted networks behind UDM-PRO

    Scheduled Pinned Locked Moved NAT
    3 Posts 2 Posters 675 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      gmhmaster
      last edited by

      Hi, first of all i would like to thank you for that great product and i appreciate your efforts keeping it free and up to date.
      I'm using Pfsense Firewall as my main firewall for internal users' internet access. I'm also using 2 UDM Pro wireless controllers in my network environment for wireless users.
      Wireless users' networks are actually behind the UDM pro wan ip which means it gets NATted by UDM Pro and Pfsense should only can see UDM Pro wan ip. Both of UDM pros are using static ips that are part of Pfsense network (vlan) for NATting UDM pro's internal networks.
      But when i look at the Pfsense firewall logs i see constant logs about UDM pro internal networks getting dropped by firewall with TCP:FPA, TCP:FA, TCP:R, TCP:RA flags.
      The thing i don't understand is how Pfsense firewall sees UDM pro internal networks, how networks behind NAT can send packets directly to the firewall? And if so, how can i know which firewall interface receives that type of packets.
      Overall, packet drops are not noticed by users but i know that something is not normal with my network. And i want eliminate the risks of my network being out of service because of unknown issues.
      WhatsApp Image 2022-08-18 at 3.52.08 PM.jpeg WhatsApp Image 2022-08-18 at 3.52.08 PM(1).jpeg

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @gmhmaster
        last edited by

        @gmhmaster said in Pfsense sees NATted networks behind UDM-PRO:

        getting dropped by firewall with TCP:FPA, TCP:FA, TCP:R, TCP:RA flags.

        Those are all out of state drops.

        Screams asymmetrical. There should be no way for pfsense to see those packets if your network was correctly setup.

        So either your networks not isolated like you think you are, or your udms are sending that traffic on without natting it.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • G
          gmhmaster
          last edited by

          What type of misconfiguration can cause these issues? I'm actually quite doubtful about my network, because on some parts of network we are using hubs (unmanaged switches). Can improper isolation of vlans be the cause of problem ?

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.