It's most likely your specified Protocol in the "allow" rule you have set. Open the rule that you believe should allow the traffic and change the rule from TCP, UDP, TCP/UDP to say any.
On Tue, Jul 22, 2014 at 5:30 PM, Khurram Khan <brokenf...@gmail.com> wrote: > Hi Team, > > Trying to figure out an issue i'm facing with pfsense 2.1.4. I'm routing > 192.168.0.0/24 via pfsense. this block resides on a linux machine. within the > internal LAB if i ping to 192.168.0.5 , all the machines on the LAN can ping > successfully. However, if i ping from the linux machine , sourcing from > 192.168.0.5, to the pfsense LAN IP , my pings fail. i've got a firewall rule > on the pfsense firewall allowing anything from 192.168.0.0/24 to anything. > > here's what the topology looks like: > > > internet <> rl1 <> pfsense <> rl0 <> LAN > > LAN subnet (rl0) : 10.10.171.0/24 > > here are the routes on the pfsense appliance: > > [2.1.4-RELEASE][ad...@pfw01.b.lan]/root(1): netstat -rn | grep 192.168. > 192.168.0.0/24 10.10.171.80 UGS 0 161 rl0 > > and here's the rl0 interface: > > [2.1.4-RELEASE][ad...@pfw01.b.lan]/root(4): ifconfig rl0 | grep inet | grep > -v inet6 > inet 10.10.171.1 netmask 0xffffff00 broadcast 10.10.171.255 > > > > the LAN subnet is : 10.10.171.0/24 > the server that 192.168.0.0/24 resides on is : 10.10.171.80 > > > when trying to initiate the ping from 10.10.171.80, sourcing 192.168.0.5 and > destined for 10.10.171.1 (rl0), pings fail and here is what i see in the logs: > > > Jul 22 15:27:53 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:00.999960 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22636, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:54 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:00.999984 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22638, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:54 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:00.999984 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22638, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:54 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:00.999984 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22638, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:55 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:01.000045 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22640, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:55 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:01.000045 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22640, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:55 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:01.000045 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22640, offset 0, flags > [DF], proto ICMP (1), length 84) > Jul 22 15:27:56 pfw01.rl0.171.10.10.in-addr.arpa pf: 00:00:01.000002 rule > 3/0(match): block in on rl0: (tos 0x0, ttl 64, id 22642, offset 0, flags > [DF], proto ICMP (1), length 84) > > > the fact that the firewall rule is there on the LAN interface , permitting > anything from 192.168/24 , plus not blocking any bogons or private addresses > on this interface, i'm scratching my head. > if someone has any ideas, would really appreciate it. > > > > > _______________________________________________ > List mailing list > List@lists.pfsense.org > https://lists.pfsense.org/mailman/listinfo/list _______________________________________________ List mailing list List@lists.pfsense.org https://lists.pfsense.org/mailman/listinfo/list