• Routing issue related to dynamic nature of OpenVPN interface (I think)

    19
    0 Votes
    19 Posts
    657 Views
    T

    @vbman213

    I don't know if this will help any. I've been running SIP through pfSense for more than 12 years now and have come across various difficulties that I've mostly beaten into submission at this point... although, the maturity of all the moving pieces has helped a lot along the way. The following laundry list is not specific to your issue, just something to review and consider what the impact would be, if any, in your specific setup.

    SIP challenges IP layer addresses/ports are written in Application Layer headers. PBX may be trying to mitigate problems by predicting the public address of a server on a private subnet. It’s important to understand what behavior is enabled and determine if it’s suitable to the architecture, including all edge cases. SIP application layer header rewriting rules may be required, and if so, care must be taken to mitigate issues with edge cases When STUN is in use there will be problems if it’s used incorrectly; i.e. reached through wrong path, returns wrong answer. Care must be taken to avoid race conditions if/when failovers can dynamically change the public IP. Out-of-Band SIP application protocol negotiates a transport stream protocol with specific IP layer address/port pairs. Usually this is implemented by opening a static block to be utilized for S/RTP port assignments, rather than synchronizing the negotiation with rules dynamically. This pool MUST be synchronized with the PBX. You need to be clear on which side can initiate the S/RTP stream so the rules are in the right place. Packet filters generally can’t distinguish separate application layer streams over UDP, so a SIP REGISTER (outbound) will enable a SIP INVITE (inbound) to PASS even when there is no functional inbound rule, as long as the State continues to exist (assuming both sides are using port 5060). SIP should be implemented over TCP since the control protocol benefits from being reliable. S/RTP streams should be implemented over UDP because reliability is undesirable. In real time applications, packets arriving late or out of order have no value. You can’t play audio packets out of order, and can’t hold up real-time streams for retransmission of lost packets without introducing an unrecoverable delay. Reliable tunnels can exacerbate the problem, and certainly will contribute to judder. Real-time traffic needs to basically follow a now or never pattern. Silence is not golden. In some configurations, silence, like muting a phone while on a conference call, will cause no S/RTP packets to be sent. I’ve had issues with silence lasting more than 5-minutes causing the call to terminate. It appears that something in the path decides to timeout if no S/RTP packets are received for 5-minutes, and declares the call to be abandoned. Firewalls may expire state table entries considered stale even though the call is active from the application perspective. There is usually an option to “generate silence packets” which actually creates packets with pseudo-background noise, which then maintains a consistent S/RTP stream and lessens the likelihood calls will drop due to S/RTP timeouts. FYI: I’ve seen some phones that were too smart for their own good; generating silence packets when the audio was silent, but as soon as Mute was activates the S/RTP stream stopped anyway.
  • 0 Votes
    10 Posts
    1k Views
    S

    I noticed this was fixed in 2.5/21.2:
    https://redmine.pfsense.org/issues/10546
    "In this case, pfsense will consider a gateway down when it has actually returned to a normal state, necessitating administrator action to return it back to a proper state."

  • PPPoE over L2TP

    1
    0 Votes
    1 Posts
    311 Views
    No one has replied
  • Route between OpenVPN Server and OpenVPN Clients

    5
    0 Votes
    5 Posts
    586 Views
    G

    Hello everyone,

    I myself resolved this case. Summary:

    Pfsense openvpn interface name: OVPN_TINH. Tunnel network: 10.0.8.0/24.

    Singapore provider's openvpn interface name: SINGAPORE.

    Aliases name is website include: whatismyipaddress.com, google.com

    I want to remotely access the VPN server on my pfsense box and then have my outbound traffic destined to "google.com" exit via the VPN client SingaporeVPN service provider.

    Firewall > NAT > Outbound. Add.
    Interface: SINGAPORE
    Protocol: any.
    Source: Network: 10.0.8.0/24
    Destination: any.
    Save.

    Firewall > Rules > OpenVPN. Add (OpenVPN interface pfsense).
    Interface: OpenVPN_TINH
    Protocol: any.
    Source: OVPN_TINH net.
    Destination: Single host or alias: website
    Gateway: SINGAPORE
    Save. Apply changes.

    Result:
    From my laptop showed Singapore vpn wan ip: 89.187.163.119

  • Problem with multiple wan in Netgate XG-7100

    1
    0 Votes
    1 Posts
    138 Views
    No one has replied
  • Sendto error: 55

    Moved
    1
    0 Votes
    1 Posts
    469 Views
    No one has replied
  • WAN Failover to USB LTE... failing

    1
    0 Votes
    1 Posts
    191 Views
    No one has replied
  • Routing issue or ?

    19
    0 Votes
    19 Posts
    1k Views
    L

    Screen Shot 2021-02-12 at 12.06.47 PM.png

    Adding floating rules to allow HTTP, HTTPS, ICMP, and NTP inbound for LAN fixed the issues. No more errors on the Cacheboxes and websites load like they should.

  • pfsense no ping and Wold wide Web

    1
    0 Votes
    1 Posts
    124 Views
    No one has replied
  • WAN failover and IPsec, a never ending story?

    8
    0 Votes
    8 Posts
    811 Views
    F

    Today I need to bring down the WAN 2 link for an installation of a new wall outlet.
    During WAN2 was down I tried the VPN connection - works as expected 👍 , using the WAN1 link.
    When WAN2 was up again I checked again the VPN connection, again it worked, now with WAN2.
    Without my pseudo tunnels it will not work. I guess, that is a bug in pfSense software.
    Looking forward, if 2.5 will fix this issue.
    As far as I found this issue is a very old one, people claimed since years about it.

    Regards

  • One Non-Accessible Domain. WireGuard OK. OpenVPN on pfSense Not OK.

    1
    0 Votes
    1 Posts
    224 Views
    No one has replied
  • IPv6 forwarding in 2.5 RC unexpectedly broken

    3
    0 Votes
    3 Posts
    338 Views
    A

    Found it. I advertise my routes via BGP. There's no OpenBGPd package in 2.5 RC. So, I'm not advertising my routes anymore 😢. Never even occurred to me... *&^%$#@!

    Guess I'll install FRR and try that out now, whether I wanted to or not.

  • GUI unresponsive when second WAN (OPT) is connected

    9
    0 Votes
    9 Posts
    797 Views
    D

    @noplan Just a friendly check in to see if there are other screen shots you might need.

  • Need more than 5 Tier

    1
    0 Votes
    1 Posts
    148 Views
    No one has replied
  • How to Set up DUAL WAN on ETH1 and ETH2 on XG-7100-1u

    1
    0 Votes
    1 Posts
    209 Views
    No one has replied
  • Packet loss

    3
    0 Votes
    3 Posts
    541 Views
    N

    @teamits I have done this multiple times. It goes away with a single line but it does not matter which one.

  • Not round robin

    3
    0 Votes
    3 Posts
    411 Views
    N

    @hieroglyph they were set the same. Over the course of 24 hours it evened back out.

  • Default GW not being used

    11
    0 Votes
    11 Posts
    828 Views
    S

    @greeves

    Hello!

    I am on 2.4.5-p1 with multi-wan (failover/loadbalance). WAN0 -tier1, WAN1 - tier2.

    When WAN1 goes down/up, I dont see any of the tunnels on WAN0 being affected.

    John

  • One gateway on failover multiwan is behind NAT

    2
    0 Votes
    2 Posts
    258 Views
    V

    @ddbnj said in One gateway on failover multiwan is behind NAT:

    My question is how do I set up my network to that the VPS IP address only attaches via the LTE gateway.

    Your network has to establish the connection, since it has a dynamic IP, for instance a VPN to the VPS. For stating the gateway to be used for that connection you have to add a static route for the VPS IP and select the LTE gateway.

  • 0 Votes
    3 Posts
    626 Views
    J

    @mainzelman Thanks for the reply.

    Site B IPSec firewall rules were empty (I assumed this to be ok because Site A and Site B hosts can talk no problems)

    I added the rule for Site B and it appears to be now working!
    dd6e54f6-fa74-4b38-bf03-a8b3e6c04ec9-image.png

    I knew it had to be something simple I missed, thank you!

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.