Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense blocking connections through Office Extend AP. Need help finding block and creating an allow rule.

    Scheduled Pinned Locked Moved General pfSense Questions
    11 Posts 3 Posters 1.1k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG Offline
      Gertjan @rienge01
      last edited by

      @rienge01

      Hi,

      When installed, pfSense blocks nothing on it's LAN interface. All traffic is allowed.
      When a client connects to your LAN network - it works, right ?

      When the client connects to your "the ap successfully joins the corporate controller", what was the IP it got ? Network ? The gateway ? DNS ?

      If your ddwrt was using a LAN like 192.168.1.1/24, with the DHCP server activated on LAN, you could swap the ddwrt with pfSense and it would work out of the box.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      R 1 Reply Last reply Reply Quote 0
      • R Offline
        rienge01 @Gertjan
        last edited by

        @gertjan Thanks for your response. You bring up some good questions.

        Yes, all of my normal clients are working great! Internal and internet access as well as software VPN to work, all works perfect.

        I'm using the same private network internally as I was with my previous router 10.7.7.0/24 which is served by a pihole running both DHCP and DNS and unchanged from the ddwrt setup. I have DHCP v4 and v6 shut off for the LAN int in the PF, and I have the pihole address configured as the DNS server in the PF general settings.

        So the OEAP gets 10.7.7.209, which is correct, and gets the pF as its gateway from DHCP just as all other clients. Layer 3 seems to be working fine because it gets out to the controller on the public internet and successfully joins.

        Maybe I'm missing a NAT or VPN passthrough that is automatically done with ddwrt and other consumer-grade routers?

        Thanks for the help !

        GertjanG 1 Reply Last reply Reply Quote 0
        • GertjanG Offline
          Gertjan @rienge01
          last edited by

          @rienge01 said in Pfsense blocking connections through Office Extend AP. Need help finding block and creating an allow rule.:

          Maybe I'm missing a NAT or VPN passthrough that is automatically done with ddwrt and other consumer-grade router

          NAT is an incoming traffic thing. Not related to outgoing traffic.
          VPN = all VPN outgoing traffic is passed by default.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          R 1 Reply Last reply Reply Quote 0
          • stephenw10S Offline
            stephenw10 Netgate Administrator
            last edited by

            So is all traffic from clients on the OEAP supposed to go over a VPN to a remote office?

            And that VPN is not working?

            The biggest difference between pfSense and SOHO routers in a default install is that pfSense randomises the source port for all outgoing connections through it for security. However some older protocols or devices assume a fixed port and fail. That includes some IPSec connections.

            So you may need to add an outbound NAT rule with a static port set for traffic from the OEAP to the remote side.

            Steve

            R 1 Reply Last reply Reply Quote 1
            • R Offline
              rienge01 @stephenw10
              last edited by

              @stephenw10

              Yes! Any client that joins the OEAP SSID will go through a tunnel to the corporate office. We deploy these as an easy way to have an always-on VPN to main campus for people working from home. So, I'm trying to do a VPN through, or "behind" the pfsense.

              Cisco officeextend overview:
              https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-5/b_Cisco_Aironet_1815_Teleworker_Access_Point/b_Cisco_Aironet_1815_Teleworker_Access_Point_chapter_01.pdf

              I think you're on the right path. I made a static outbound NAT based on your suggestion. (I don't know a good way to write it, so I'll just try this)

              int=WAN source=10.7.7.209/32 srcPort=5246:5247 dest=* destPort=* NATaddr=WAN address NATport=* Static port=yes

              Didn't fix it.

              So I added a port forward as well, so the controller would always get back to the AP:

              int=WAN. Protocol=UDP. SrcAddr=[public addr of controller] SrcPorts=* DestAddr=WANaddr DestPorts=5246-5247 NAT_IP=10.7.7.209 NATports=5246-5247

              still not working.

              1 Reply Last reply Reply Quote 0
              • stephenw10S Offline
                stephenw10 Netgate Administrator
                last edited by

                Try removing the source port from that outbound NAT rule. You would not normally ever set that. You might set the destination port if you know it but as a test just static NAT all the traffic from the OEAP. You might have to clear any open states from it to allow it create new states using the new rule.

                Are you able to see if the OEAP is failing to bring up it's tunnel?

                Steve

                R 1 Reply Last reply Reply Quote 1
                • R Offline
                  rienge01 @stephenw10
                  last edited by

                  @stephenw10

                  Yes, yessss... YEEESSSS!!!! ๐Ÿ™Œ

                  You're the best, Steve! That did it. Fantastic.

                  T h a n k Y o u !! ๐Ÿ˜ƒ

                  1 Reply Last reply Reply Quote 1
                  • stephenw10S Offline
                    stephenw10 Netgate Administrator
                    last edited by

                    No worries! ๐Ÿ˜

                    You can make that rule more specific to the VPN if you need to but your probably don't.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • R Offline
                      rienge01 @Gertjan
                      last edited by

                      @gertjan said in Pfsense blocking connections through Office Extend AP. Need help finding block and creating an allow rule.:

                      NAT is an incoming traffic thing. Not related to outgoing traffic.
                      VPN = all VPN outgoing traffic is passed by default.

                      This post it is incorrect and misleading for any readers in the future. NAT is applied outbound to your traffic to translate private addresses into your public WAN address. Port Forwarding is used inbound to map a specific tcp port to a specific internal private address.

                      1 Reply Last reply Reply Quote 1
                      • stephenw10S Offline
                        stephenw10 Netgate Administrator
                        last edited by

                        Both are forms of NAT, translating IP addresses/ports. pfSense just uses the term port forwarding for inbound.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.