Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Must be Missing something

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N Offline
      nate4567
      last edited by

      Currently on a version 2.2.4-RELEASE. I am having problems reaching some private networks through pfsence. To try to get this working I put the top rule as a pass any any

      IPv4 * LAN net * * * * none Default allow LAN to any rule

      I have 2 rules on the Wan side, one of them is my OpenVPN

      • Reserved/not assigned by IANA * * * * * * Block bogon networks
                IPv4 UDP * * WAN address 1194 (OpenVPN) * none OpenVPN NT wizard

      Im on the 10.169.169.0 network and Im reaching 90% of my other private IP range but for some reason the equipment on the 172.16.50.0 port 80 is returning

      No data received

      ERR_EMPTY_RESPONSE

      and I can telnet to it also and it connects but never shows the login prompt

      I can reach 172.16.15.x and 172.16.16 through the firewall and if I unplug the computer and move to my other connection I can reach them plus the 172.16.50 network works also via telnet and http. I dont understand what Im doing wrong. If you can tell me what other info you need to look at I can get it posted.

      thanks

      1 Reply Last reply Reply Quote 0
      • KOMK Offline
        KOM
        last edited by

        Anything in your Firewall log?

        1 Reply Last reply Reply Quote 0
        • N Offline
          nate4567
          last edited by

          There was some in there but nothing having to do with 172.16.50.x

          1 Reply Last reply Reply Quote 0
          • DerelictD Offline
            Derelict LAYER 8 Netgate
            last edited by

            Rules on WAN for OpenVPN are pretty meaningless. Either the tunnel comes up or it doesn't. You should be more concerned with the rules on your OpenVPN and LAN interfaces/interface groups.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • N Offline
              nate4567
              last edited by

              The rules was put there by the openvpn wizard. The OpenVPN works flawlessly and has nothing to do with this problem. I am working at the site trying to get the network accessable.

              1 Reply Last reply Reply Quote 0
              • DerelictD Offline
                Derelict LAYER 8 Netgate
                last edited by

                You need to provide more information about what networks are where.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • N Offline
                  nate4567
                  last edited by

                  Misc Routers/ Switches and equipment at about 14 locations.
                  172.16.15.0 /24
                  172.16.16.0 /24
                  172.16.50.0 /24
                  192.168.104 /24
                  192.168.105 /24      –----------> Cisco 12000  -----------> Cisco 6509 -----------> Server w/PFSense  -------------> 15 Employees
                  10.1.1.0 /24                                                                                                    Wan 209.2xx.xx.x / 10.169.169.0 /24
                  10.100.1.0/27
                  10.100.11.0 /27

                  Employees can get to any private subnet except 172.16.50.x. I can ping it and get replys, I can telnet to it, once it connects it never gets to the login page and port 80 and 443 give me a

                  No data received

                  ERR_EMPTY_RESPONSE

                  Under the Diag Port test I get " Connection to 172.16.50.10 80 port [tcp/http] succeeded!"

                  1 Reply Last reply Reply Quote 0
                  • DerelictD Offline
                    Derelict LAYER 8 Netgate
                    last edited by

                    I'd check the config in the Ciscos.  There's really nothing in pfSense that would cause that.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • KOMK Offline
                      KOM
                      last edited by

                      You may have to roll up your sleeves and capture some packets on both ends to see where the  breakdown occurs.

                      1 Reply Last reply Reply Quote 0
                      • N Offline
                        nate4567
                        last edited by

                        If I bypass PFSense and go direct into a cisco Device I can get to it fine. It has something to do with the Nat'ing or Firewall within this PFSense box. I have done a little capturing but Everything points at the PFSense server and I dont know how to get around it. I have had good luck with it but for some reason this is fighting me and I dont know how to get around it.

                        1 Reply Last reply Reply Quote 0
                        • KOMK Offline
                          KOM
                          last edited by

                          Is there anything unique about 172.16.50.x as compared to 172.16.15.x or 172.16.16.x??  Are these VLANs?  Maybe we should start with your interface details, NAT rules and firewall rules screenshots.

                          1 Reply Last reply Reply Quote 0
                          • N Offline
                            nate4567
                            last edited by

                            Here is the interfaces and rules

                            wan.png_thumb
                            wan.png
                            ![wan interface.png](/public/imported_attachments/1/wan interface.png)
                            ![wan interface.png_thumb](/public/imported_attachments/1/wan interface.png_thumb)
                            ![Lan interface.png](/public/imported_attachments/1/Lan interface.png)
                            ![Lan interface.png_thumb](/public/imported_attachments/1/Lan interface.png_thumb)
                            lan.png
                            lan.png_thumb

                            1 Reply Last reply Reply Quote 0
                            • DerelictD Offline
                              Derelict LAYER 8 Netgate
                              last edited by

                              There is nothing there that would cause what you're seeing.

                              You're going to need to post a packet capture on WAN of a connection attempt filtered by the destination IP address.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.