Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Internal gateway packets being dropped

    Scheduled Pinned Locked Moved Firewalling
    6 Posts 4 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      drsbaitso
      last edited by

      Internal LAN network is 10.1.1.0/24.  I have a router at 10.1.1.230 and two routes in the firewall for 10.52.0.0/16 and 10.152.0.0/16 which point back to 10.1.1.230.

      I have a rule to allow anything from the LAN network (10.1.1.0/24) to have no restrictions to any destination for testing.  However, packets keep getting dropped to 10.52 & 10.152 like below.  Even if I add the 'easy rule' packets are still being dropped.  Am I missing something?

      block Dec 2 16:52:22 LAN 10.1.1.49:50544 10.52.9.11:1494 TCP:PA

      1 Reply Last reply Reply Quote 0
      • K Offline
        koulee
        last edited by

        I read that this happens when the connection closes before the packets can get through. Not harmful in any way.

        1 Reply Last reply Reply Quote 0
        • D Offline
          drsbaitso
          last edited by

          @koulee:

          I read that this happens when the connection closes before the packets can get through. Not harmful in any way.

          The thing is, this happens right when the connection is being dropped.  I'm not closing out or anything.  What this is is a citrix reciever that drops connection every minute or so and comes back up.  I see these alerts that the same time that the connection drops.

          So are you saying that it's unrelated?  Citrix works just fine when I bypass the firewall, so that's why I thought this might be the issue.

          1 Reply Last reply Reply Quote 0
          • D Offline
            drsbaitso
            last edited by

            So, figured this out… had to set the bypass setiting.

            "Bypass firewall rules for traffic on the same interface"

            1 Reply Last reply Reply Quote 0
            • H Offline
              Harvy66
              last edited by

              Interesting to know. It's also good practice not to have more than one subnet per broadcast domain.

              1 Reply Last reply Reply Quote 0
              • johnpozJ Offline
                johnpoz LAYER 8 Global Moderator
                last edited by

                This seems like a convoluted configuration.  So your hairpinning your routes to get to 10.1.1.230, and you run into an asymmetric route on return traffic.

                So you have a client say on 10.1.1.49, with pfsense being say 10.1.1.1, he wants to go to 10.52.9.11.  So he sends his traffic to pfsense lan (his gateway) to 10.1.1.1, pfsense then sends the traffic back out the same interface to 10.1.1.230.

                A better setup if you want to route/firewall this traffic through pfsense would be to put this router that has connection to these 10.52 and 10.152 networks on its own transit network either on different interface on pfsense or vlan.

                So for example the network to get to the router could be say 10.1.2.0/30 where pfsense interface would be 10.1.2.1 and router 10.1.2.2

                You state you have rule on lan for lan source 10.1.1.0/24, but traffic that would come from 10.52 or 152/16 would not be allowed by such a rule if devices in those networks created traffic to 10.1.1, unless you were natting at the 10.1.1.230 router.

                Here is where you run into issues as well if your setup.. The traffic coming back from a box in the 10.52, the 1.230 router would just put it out its interface on the 10.1.1, why would it send that traffic back to pfsense?  It has in interface in that network - no reason to talk to pfsense to get there.

                Your other option is to create route on your client 10.1.1.49 that says hey if you want to talk to 10.52 or 10.152 go to 10.1.1.230 directly.  But now you can not firewall, nor in your current setup can you firewall at pfsense any traffic coming from 10.52/152 to 10.1.1

                here quick drawing - see attached.

                pfsense vlan 10, 10.1.1.1/24, vlan 20 10.1.2.1/30

                So now if 10.1.1.49 wants to talk to 10.52/152/16 he sends traffic to 10.1.1.1, pfsense then says oh to get to those networks need to talk to 10.1.2.2  the red arrows.  When traffic returns or is created from 10.52/152 follows the green arrows.  Router at 2.2 says hey to get to 10.1.1/24 I send to 10.1.2.1.

                This allows you to create firewall rules in both directions and you have symmetrical routes

                edit:  If you don't want to hairpin/route on a stick then you just use a different physical interface to connect to the router - see attached pic 2.

                trafficflow.png_thumb
                trafficflow.png
                nohairpin.png
                nohairpin.png_thumb

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.