If you run (from memory, here!) "clog -f /var/log/filter.log" while the packet 
is arriving, you should see what rule is blocking it.
You may want to set up a capture in your terminal emulator, as there will 
likely be a lot of unrelated output and it'll scroll off-screen quickly.
-Adam

On July 17, 2014 12:20:10 PM CDT, NetSys Pro <netsys...@live.com> wrote:
>I just did a tcpdump on pfSense and I do see the ICMP request coming in
>on the OPT1 interface.So, this means that the WANOPT appliance is not
>the culprit.
>
>Subject: RE: [pfSense] Disable antispoofing on an interface
>From: athom...@athompso.net
>Date: Thu, 17 Jul 2014 12:10:44 -0500
>To: netsys...@live.com; list@lists.pfsense.org
>
>Not really possible.  If tcpdump cann't show you the packet, then the
>problem is occurring before pfSense... i.e. in the WAN optimizer.
>
>On July 17, 2014 12:01:12 PM CDT, NetSys Pro <netsys...@live.com>
>wrote:
>
>
>
>Adam,
>Thanks for your reply.First of all, as I said before, I had already
>posted the same question on the forum and had not received any
>reply.However, Chris BUECHLER replied to my posts about 2 days ago.If
>it is better that I stop the cross-posting, then someone please do
>advise.Until then, we'll continue on both the forum and here in the
>mailing list.Of course, I will update both with the findings.
>So, regarding your question, from the log (see screenshot on the forum)
>on the remote pfSense, I see that the ICMP request is ALLOWed into the
>remote OPT1 (aka SILVERPEAK) interface.However, after doing packet
>captures on the other interfaces, I do not see the packet coming out
>anywhere!So, I suppose the packet is being silently dropped. Is that
>possible?
>
>Subject: RE: [pfSense] Disable antispoofing on an
>interface
>From: athom...@athompso.net
>Date: Thu, 17 Jul 2014 10:50:27 -0500
>To: netsys...@live.com; list@lists.pfsense.org
>
>How do you know pfSense is dropping the packet?  Does it show up in a
>packet capture on OPT1?
>
>-Adam
>
>On July 17, 2014 5:12:07 AM CDT, NetSys Pro <netsys...@live.com> wrote:
>
>
>
>Hello Adam,Anything else I could try?
>Thanks
>
>Subject: Re: [pfSense] Disable antispoofing on an interface
>From: athom...@athompso.net
>Date: Mon, 14 Jul 2014 20:24:36 -0500
>To: list@lists.pfsense.org; netsys...@live.com
>
>I suspect you need to be looking not for anti-spoofing but for
>anti-bogon rules.
>
>Can't remember what pfSense calls it offhand.
>
>-Adam
>
>
>
>On July 14, 2014 6:19:22 PM CDT, NetSys Pro <netsys...@live.com> wrote:
>
>  
>
>    
>  
>  
>    Hello everyone,
>
>      
>
>      First of all, please note that I have already posted the question
>      below on the pfSense forum (see
>      https://forum.pfsense.org/index.php?topic=79081.0) since about 1
>      week without any reply.
>
>      Given the urgency of the matter, I decided to post to the mailing
>      list, hoping for some here.
>
>      
>
>      BTW: I don't know if this will be of any help to obtain a reply,
>      please note that I have a Gold membership subscription as well.
>
>      
>
>      So, regarding my question, I'll copy/paste from the forum as
>      follows:
>
>      
>
>    
>
>    I have 2 pfSense boxes (both version 2.1.4) connected via the
>    Internet. Each one has 3 interfaces: LAN, WAN & OPT1.
>
>    There is an IPsec VPN between the 2 pfSense boxes.
>
>    A WAN optimisation (we'll call it WANOPT) appliance is connected to
>    the OPT1 interface on each side.
>
>    There is a UDP tunnel between the 2 WANOPT appliances. This UDP
>    tunnel goes inside the IPsec tunnel.
>
>    I use PBR (as a LAN rule) to redirect traffic going to the remote
>    LAN into the WANOPT appliance.
>
>    
>
>    This is what I've observed after starting to ping a remote LAN
>    machine from a local LAN machine:
>
>    1. On reaching the local LAN interface, the ICMP echo request is
>    properly redirected to the WANOPT appliance.
>
>    2. The ICMP request then goes inside the UDP tunnel.
>
>    3. The UDP packets go into the IPsec tunnel.
>
>    4. On the remote side, a tcpdump shows that the ICMP packet does
>    come out of the WANOPT appliance and therefore the UDP tunnel.
>
>    5. It then reaches the OPT1 interface of the remote firewall.
>
>    6. However, it does NOT come out any interface!!!
>
>    7. I have an "Allow all protocols from any to any" rule on both the
>    IPsec and OPT1 interfaces, for testing purposes.
>
>   8. There's nothing in the log saying that the packet was dropped. In
>    fact, there's a log entry which says that the packet was actually
>    allowed into the OPT1 interface!
>
>    
>
>    What has happened to the packet?
>
>    
>
>    NB:
>
>    1. On the remote side, when the ICMP packet comes out of the UDP
>    tunnel, its source IP is that of the local LAN machine and its
>    destination is that of the remote LAN machine.
>
>    2. Is this packet being considered a spoofed packet?
>
>    
>
>   I modified the file /etc/inc/filter.inc (around line 3105 in pfSense
>    2.1.4) to disable antispoofing on the OPT1 interface and rebooted
>    both firewalls without any success.
>
>    I confirmed that the file /tmp/rules.debug did not contain the
>    antispoof directive for the OPT1 interface after reboot.
>
>    RFC 1918 private IP addresses are not being blocked either.
>
>    
>
>    Thank you for any help.
>  
>
>
>List mailing list
>List@lists.pfsense.org
>https://lists.pfsense.org/mailman/listinfo/list
>
>
>
>-- 
>
>Sent from my Android device with K-9 Mail. Please excuse my brevity.           
>                         

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
_______________________________________________
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to