Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Lan 1 to Lan 2 Connection Fail

    Scheduled Pinned Locked Moved NAT
    45 Posts 5 Posters 13.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T Offline
      tridac
      last edited by

      John,

      You asked about the stuff in the advanced section. Just a few minor changes to improve security:

      1. None standard https management port

      2. Randomise id field in ip packets

      3. Insert stronger id into ip header for packets passing though the filter.

      If you run zenmap against the wan port, it more or less susses out which os it is, but doesn't find much else. Going to try some of the Kali Linux stuff in the next few weeks, which may find some holes, though I doubt it. I wonder if the nsa have found a way in yet ?…

      Regards,

      Chris

      Detachment from all bias and influence is the only way to get to the truth…

      1 Reply Last reply Reply Quote 0
      • johnpozJ Offline
        johnpoz LAYER 8 Global Moderator
        last edited by

        What I wasn't clear in your other posts of your dumps is what actual interface you did the trace on..  Be it they were on pfsense, server or client.

        Statements like this
        "Pfsense console tcpdump also shows the outgoing request to the server on the interface. However, it never sees the server response."

        From a common sense point of why would you be sniffing on the interface on the other side of pfsense??  Until you had validated that it had showed up on the input interface to pfsense.

        This trace for example.

        You state this is the trace at the server..

        "Also, I did  show the output from tcpdump at the server, firelight:

        19:00:27.909689 IP 172.16.100.205.53942 > firelight.telnet: tcp 0
        19:00:27.909804 IP firelight.telnet > 172.16.100.205.53942: tcp 0
        19:00:30.914297 IP 172.16.100.205.53942 > firelight.telnet: tcp 0
        19:00:30.914362 IP firelight.telnet > 172.16.100.205.53942: tcp 0"

        So one statement from you says pfsense does not see the response, then you show that server sent the response.

        As to you starting over - already suggested multiple times to do that.. YOU DO NOT NEED NAT!!!  And from your port forward your trying to send anything going to port 23 on the "housenet net" which is the 172 space – so when would that even be hit? to the server on labnet.

        And you have both tcp/udp ??  So yes I would START OVER..  And just do any any rules between your local segments..  Once that works, then you can block or allow what you want between your segments with firewall rules - not nats and or port forwards.

        As to the advanced options - that is not what I am talking about..  I am talking you have set something in the advanced features of the rule..  See attached.  What have you done there?  Your labnet rule shows that an advanced feature was set on the rule - that is what I was asking about.

        BTW - I can understanding wanting to be secure, etc. and sure if you want to use random in the IP ID, ok -- but now I might be mistaken - but pretty sure that would be changed again at your other nat since your pfsense wan is 10.x.x.x you clearly have to be doing NAT again to talk to the internet or your clients behind pfsense would have to be using a proxy to get out, etc.  So your wanting to hide your OS from this 10.x.x.x network?

        housenet.png
        housenet.png_thumb
        advancedfeatures.png
        advancedfeatures.png_thumb
        aflaginrule.png
        aflaginrule.png_thumb

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • T Offline
          tridac
          last edited by

          I tried reinstalling with the same rules as per the screenshots and it's still not working, so have to assume for now that this configuration is not supported at present. Will just have to find a different solution for now, but if you need any more info to confirm the findings, please let me know

          Thanks for the help and suggestions in any case…

          Regards,

          Chris

          Detachment from all bias and influence is the only way to get to the truth…

          1 Reply Last reply Reply Quote 0
          • T Offline
            tridac
            last edited by

            John,

            Just to clear up one misunderstanding, "pfsense console tcpdump" means that tcpdump was running on the pfsense console shell. It's a built in command and part of pfsense.

            The packet is definately on the wire at the lab interface, but it's not seen by the pfsense shell tcpdump, so where can it be ?…

            Regards,

            Chris

            Detachment from all bias and influence is the only way to get to the truth…

            1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator
              last edited by

              I know what tcpdump is ;) and how to run it..

              And again your saying its not there.. So lets clear up where your running it..

              you have

              client – pfsense -- server

              where you telneting from client to server..

              So which interface are you running tcpdump on?  the client side or the server side?

              You need to run it on the server side.. If your running on server side and you see packets go out to server.  And wireshark/tcpdump running on server shows it sending replies to that traffic but you don't see those reply packets on pfsense then 110% sure pfsense has NOTHING to do with your issue.

              All I can say is this takes all of 3 minutes to setup.. There is NO nat between local networks..  And its simple firewall rules to allow whatever traffic you want.  As I showed you when I changed my dmz segment to 172.15

              I assure you that pfsense supports this setup so your doing something wrong in the config. Or you have something else wrong on your network.

              I would be happy to teamviewer in and take a look if you want.

              Back to the tcpdump -- if you run it on the server side and see the return traffic.  But don't see it on the client side of pfsense then yeah something is wrong with pfsense.  So which exact interface are you running the tcpdump on pfsense client or server labnet or homenet.. Where if can keep your networks straight homenet is the client side and your telnet server is on the labnet side.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.