Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Weird VPN server issue (pfSense/win2022server)

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 3 Posters 1.0k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      aagaag
      last edited by

      I am setting up a VPN server on a Win2022 server. My Win10 clients can log onto the VPN without problem from within the intranet, by addressing either the public URL or the IP address of the server. Obviously this not usefl, except that it proves that the VPN plumbing works well.

      However, when trying to reach the VPN from outside, they fail. For testing purposes, I have directed all TCP/UDP traffic from WAN to the server (see rule, now inactive), but even that doesn't work. What might be the cause?

      16acb585-700f-4eef-bc81-322598cc423a-image.png

      V 1 Reply Last reply Reply Quote 0
      • V Offline
        viragomann @aagaag
        last edited by

        @aagaag said in Weird VPN server issue (pfSense/win2022server):

        I am setting up a VPN server on a Win2022 server.

        Which kind of VPN? Which protocols and ports does it need?

        For testing purposes, I have directed all TCP/UDP traffic from WAN to the server (see rule, now inactive), but even that doesn't work. What might be the cause?

        The shown NAT rule seems to be deactivated, as it's greyed out.

        A 1 Reply Last reply Reply Quote 0
        • A Offline
          aagaag @viragomann
          last edited by

          @viragomann, it's pretty standard Windows (see pic). For protocol, I like SSTP but I am not dogmatic. As for the ports, the rule I showed above should NAT everything, right? And yes, I have deactivated the rule because I didn't want to block the access to everything else for a long time. But the problem persisted also with the rule active.

          c802b1ed-2746-47a3-85e1-782f9f5d5be2-image.png

          V 1 Reply Last reply Reply Quote 0
          • V Offline
            viragomann @aagaag
            last edited by

            @aagaag said in Weird VPN server issue (pfSense/win2022server):

            As for the ports, the rule I showed above should NAT everything, right?

            Every TCP and UDP packet. But possibly that is not enough for the VPN server.
            You should better know, which kind of VPN is and what it needs.

            I guess, it's an IPSec. If so, you better search for "run an IPSec access server behind pfSense / firewall".

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              Yup, you might need ESP (or GRE). You would see that traffic blocked in the firewall logs from the test client IP though.
              Try using a 1:1 NAT rule instead that will forward all protocols. If that works you can look at the traffic and make the required port forwards instead.

              Steve

              A 1 Reply Last reply Reply Quote 0
              • A Offline
                aagaag @stephenw10
                last edited by

                @stephenw10 Thank you Steve, appreciated. I have never tried 1:1 NAT. Is it correct to do the following:

                • set interface as WAN
                • set protocol as IPv4
                • set external IP as the public IP of the gateway
                • set internal IP as the server that should receive all traffic

                Because that's what I did, and I can still RDP all the internal servers, so obviously I am wrong...

                1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  The external IP should be the WAN public IP not the gateway.

                  If you have individual port forwards they will override a 1:1 NAT rule. So if you have forwards for RDP on individual ports those should continue to work.

                  Steve

                  A 1 Reply Last reply Reply Quote 0
                  • A Offline
                    aagaag @stephenw10
                    last edited by

                    @stephenw10 Dear Steve, you made my day! All I needed to do was to set a rule to pass GRE packets. And now everything works perfectly. I was already considering getting professional help (I am a medical doctor, not a network specialist), and your hint saved me a few hundreds bucks!!! Heartfelt thanks!

                    1 Reply Last reply Reply Quote 1
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      Good to hear!

                      You should be aware though that the fact you had to forward GRE implies the VPN type you're using is probably PPTP which is an outdated protocol and considered insecure.
                      You should check the VPN type in use to be sure.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.