Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VOIP provider after schedule not registering debug help required

    Scheduled Pinned Locked Moved Firewalling
    28 Posts 2 Posters 1.2k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S Offline
      stephenw10 Netgate Administrator
      last edited by

      All 3 providers register using the same WAN/gateway?

      4 1 Reply Last reply Reply Quote 0
      • 4 Offline
        4o4rh @stephenw10
        last edited by 4o4rh

        @stephenw10 if I understand you, yes.

        It's a Gigaset C610A IP and can register up to 6 incoming providers and one outgoing provider. Was working since 2.4x in actual fact. if i reboot the phone, it doesn't help. But rebooting the pfsense allows all connections to register. I think that is because they occur before all the rules are loaded

        1 Reply Last reply Reply Quote 0
        • stephenw10S Offline
          stephenw10 Netgate Administrator
          last edited by

          If there were no rules loaded there would be no rules to open an states and you are seeing the state open for one provider. So more likely the connections to the other providers are not matching the rules as you expect.
          If you remove the schedule fro9m the rules and reboot do all three connect then?

          Steve

          4 1 Reply Last reply Reply Quote 0
          • 4 Offline
            4o4rh @stephenw10
            last edited by

            @stephenw10 if i reboot pfsense, all connections are established. If i leave the schedule off, for days, the connections to work even after an interruption to the primary wan connection. It is only after the schedule is activated and the first time the rules are disabled by the schedule, when enabled by the schedule only mynetfone recovers

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              Is opening connections on the wrong WAN?

              4 1 Reply Last reply Reply Quote 0
              • 4 Offline
                4o4rh @stephenw10
                last edited by

                @stephenw10 i have the gateway set on those rules to the primary wan not failover

                1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  But are there states to those other providers being opened on the other gateway? Like you might have other rules without a schedule that are passing them unexpectedly. Existing open states would attempt to carry that traffic without hitting the scheduled rules the schedule changes.

                  Steve

                  4 1 Reply Last reply Reply Quote 0
                  • 4 Offline
                    4o4rh @stephenw10
                    last edited by 4o4rh

                    @stephenw10 these are my rules
                    f4627424-348f-45b0-9620-8c75622d24fa-image.png

                    These rules are on the PRI WAN interface
                    20da0e3f-a7a8-45cc-93c0-04b977b6f051-image.png

                    p.s. I just realized those gateways are the failover gateways. i have just changed them to the primary WAN

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      I would still check the state table and see what states are opened and where at any time. Either it's trying to open states incorrectly when the schedule starts passing traffic again or there are already bad states open when it does.

                      Steve

                      4 1 Reply Last reply Reply Quote 0
                      • 4 Offline
                        4o4rh @stephenw10
                        last edited by

                        @stephenw10 Hi Steve, so I am back to this. Refreshing the memory;

                        • reboot pfsense
                        • all three voip providers register
                        • schedule to block from midnight to 6am kicks in and blocks all.
                        • 6am only one provider re-registers.
                        • checked the state tables in diagnostics for the vlan and found voiptalk still registered. (but not on the voip phone)
                        • deleted the state table and voiptalk immediately registered successfully.

                        It appears after some period of time or event, the voip will re-register, but it is random and i guess is triggered by my wan falling over, or something.

                        This never happened under 2.5.2. it is only happening since 2.6x

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S Offline
                          stephenw10 Netgate Administrator
                          last edited by

                          Did you check the state table after the schedule reopens the rules for and states to the other providers?

                          Also check the states from mynetfone. Are they incoming or outgoing states?

                          You appear to be forwarding traffic on the Pri WAN but I wouldn't expect that to be necessary for a phone behind the firewall.

                          Steve

                          4 1 Reply Last reply Reply Quote 0
                          • 4 Offline
                            4o4rh @stephenw10
                            last edited by 4o4rh

                            @stephenw10 I disabled the forwards and checked this morning.
                            mynetfone is self registered after the schedule re-opens

                            As for the States status after schedule opens:

                            WAN
                            udp WAN (ipfone) ->mynetphone
                            VLAN
                            udp sipgate -> ipfone
                            udp voiptalk -> ipfone

                            udp ipfone -> mynetphone

                            delete VLAN voiptalk state - immediate registration results with the notable difference in the state

                            WAN
                            udp WAN (ipfone) ->mynetphone
                            udp WAN (ipfone) ->voiptalk
                            VLAN
                            udp ipfone -> voiptalk
                            udp ipfone -> mynetphone
                            udp sipgate -> ipfone

                            delete VLAN sipgate state - immediate registration results with the notable difference in the state

                            WAN
                            udp WAN (ipfone) ->mynetphone
                            udp WAN (ipfone) ->voiptalk
                            udp WAN (ipfone) ->sipgate
                            VLAN
                            udp ipfone -> voiptalk
                            udp ipfone -> mynetphone
                            udp ipfone -> sipgate

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S Offline
                              stephenw10 Netgate Administrator
                              last edited by

                              Hmm, so it appears to be the existing incoming states on the internal VLAN interface.

                              That's interesting for a number of reasons.
                              It must be the port forward that was allowing those states to be created from the provider to the phone.
                              They seem to exist only on the VLAN and not the WAN even though they must have come through the WAN initially. So it appears the states were removes or timed out on WAN but somehow not the VLAN.

                              However without the port forward all opened states should be outbound so it should not be possible to get into the situation.

                              4 2 Replies Last reply Reply Quote 0
                              • 4 Offline
                                4o4rh @stephenw10
                                last edited by 4o4rh

                                @stephenw10 said in VOIP provider after schedule not registering debug help required:

                                Hmm, so it appears to be the existing incoming states on the internal VLAN interface.

                                That's interesting for a number of reasons.
                                It must be the port forward that was allowing those states to be created from the provider to the phone.
                                They seem to exist only on the VLAN and not the WAN even though they must have come through the WAN initially. So it appears the states were removes or timed out on WAN but somehow not the VLAN.

                                However without the port forward all opened states should be outbound so it should not be possible to get into the situation.

                                I disabled the forwards and rebooted for this test. They were the results of the first schedule re-open event after. What is particularly interesting is;
                                the below state does not exist before the schedule block, but only after the re-open.

                                VLAN
                                udp sipgate -> ipfone
                                udp voiptalk -> ipfone

                                The working ones are in the other direction. Just rebooted again and checked these states. Just rebooted and doubled checked. These states are not created after a fresh reboot and there are no forwards and services are registered. Will check again in the morning to see if it is repeated

                                1 Reply Last reply Reply Quote 0
                                • 4 Offline
                                  4o4rh @stephenw10
                                  last edited by

                                  @stephenw10 hi steve, so checking this morning after the schedule reopened, and the states are showing voiptalk and gigaset in the wrong direction on the vlan segment again.

                                  They were in the right direction before the schedule kicked in last night. Forwarding was deleted, and the unit rebooted last night.

                                  So two things seem strange to me;

                                  1. why do only these two and not all 3 states switch to the wrong direction after the schedule re-opens

                                  2. this behaviour is obviously new in 2.6 because notwithstanding the forwarding, it was working since 2.4.x through upgrades to 2.5.2 without problems

                                  The question is, is this a defect, or is there something I can do as a workaround?

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S Offline
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Hmm. I can't see how those states could be opened and remain open in that direction on the internal interface without also coming in on another interface. Which I expect to be WAN.

                                    Are you sure they are opened in that direction?

                                    You could try adding floating block rules to prevent those states being opened.

                                    Steve

                                    4 1 Reply Last reply Reply Quote 0
                                    • 4 Offline
                                      4o4rh @stephenw10
                                      last edited by

                                      @stephenw10 i have checked and rechecked.

                                      • no NAT forward rules
                                      • no WAN forward rules
                                      • only VLAN outgoing rules to VOIP servers/ports

                                      I will check tonight when the schedule kicks in, if the states are being created after the schedule kicks in, or re-opens

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S Offline
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        Well one thing you can do is look at the state table from the CLI to see what rule opened the state:

                                        pfctl -vvss
                                        

                                        Then you can look at the rules to see what rule number that is:

                                        pfctl -vvsr
                                        

                                        So for example on a local test device:

                                        all tcp 172.21.16.220:443 <- 172.21.16.8:38730       ESTABLISHED:ESTABLISHED
                                           [3316238557 + 4286908416] wscale 7  [1246366926 + 65792] wscale 7
                                           age 00:00:33, expires in 23:59:59, 205:428 pkts, 17217:487318 bytes, rule 85
                                           id: 252e1b6300000001 creatorid: 3f804604 gateway: 0.0.0.0
                                           origif: mvneta0
                                        
                                        @85 pass in quick on mvneta0 inet proto tcp from 172.21.16.0/24 to 172.21.16.220 flags S/SA keep state label "USER_RULE: Allow access from WAN" label "id:1661983132" ridentifier 1661983132
                                          [ Evaluations: 2004      Packets: 1315      Bytes: 633672      States: 1     ]
                                          [ Inserted: uid 0 pid 89931 State Creations: 1     ]
                                          [ Last Active Time: Fri Sep  9 15:33:33 2022 ]
                                        

                                        Steve

                                        4 2 Replies Last reply Reply Quote 0
                                        • 4 Offline
                                          4o4rh @stephenw10
                                          last edited by

                                          @stephenw10 cool. I'll give that a bash tonight once the schedule kicks in and again in the morning when it re-opens. Thanks man

                                          1 Reply Last reply Reply Quote 0
                                          • 4 Offline
                                            4o4rh @stephenw10
                                            last edited by 4o4rh

                                            @stephenw10 I can confirm, it is 3min past the activation of the schedule and the states on the vlan are;

                                            • ipfone -> mynetfone
                                            • sipgate -> ipfone
                                            • voiptalk -> ipfone

                                            So it is being caused by the schedule turning on. i've masked some of the IPs

                                            pfctl -vvsr

                                            all udp 217.61.x.x:15777 (192.168.22.6:5160) -> 125.213.x.x:5060       MULTIPLE:MULTIPLE
                                               age 18:08:26, expires in 00:04:24, 1497:776 pkts, 477198:389009 bytes, rule 123
                                               id: 6ba41a6300000003 creatorid: 5f2a04ac gateway: 185.29.x.x
                                               origif: pppoe0
                                            
                                            all udp 217.61.x.x:26167 (192.168.22.6:5160) -> 217.10.x.x:5060       MULTIPLE:MULTIPLE
                                               age 17:07:50, expires in 00:10:21, 3396:4706 pkts, 363541:343808 bytes, rule 123
                                               id: 82af1a6300000003 creatorid: 5f2a04ac gateway: 185.29.x.x
                                               origif: pppoe0
                                            
                                            all udp 217.61.x.x:14782 (192.168.22.6:5160) -> 77.240.x.x:5065       MULTIPLE:MULTIPLE
                                               age 17:10:46, expires in 00:14:53, 5808:3018 pkts, 1960523:1098668 bytes, rule 123
                                               id: 62db1a6300000001 creatorid: 5f2a04ac gateway: 185.29.x.x
                                               origif: pppoe0
                                            
                                            all udp 217.10.x.x:5060 -> 192.168.22.6:5160       MULTIPLE:MULTIPLE
                                               age 00:09:53, expires in 00:14:50, 23:62 pkts, 736:29737 bytes, rule 122
                                               id: a89b1b6300000003 creatorid: 5f2a04ac gateway: 0.0.0.0
                                               origif: igb2.22
                                            
                                            all udp 77.240.x.x:5065 -> 192.168.22.6:5160       MULTIPLE:MULTIPLE
                                               age 00:09:37, expires in 00:14:53, 20:88 pkts, 5760:43859 bytes, rule 122
                                               id: b09b1b6300000003 creatorid: 5f2a04ac gateway: 0.0.0.0
                                               origif: igb2.22
                                               
                                            all udp 192.168.22.5:53 <- 192.168.22.6:32978       MULTIPLE:MULTIPLE
                                               age 00:07:14, expires in 00:14:44, 6:6 pkts, 408:504 bytes, rule 467
                                               id: f49b1b6300000003 creatorid: 5f2a04ac gateway: 0.0.0.0
                                               origif: igb2.22
                                            

                                            pfctl -vvsr

                                            @37 pass in quick on igb2.22 inet proto udp from any port = bootpc to 192.168.22.5 port = bootps keep state label "allow access to DHCP server" ridentifier 1000003592
                                              [ Evaluations: 31        Packets: 62        Bytes: 20832       States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @38 pass out quick on igb2.22 inet proto udp from 192.168.22.5 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000003593
                                              [ Evaluations: 305       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                            @462 pass in quick on igb2.22 inet proto tcp from any to 192.168.22.5 port = domain flags S/SA keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)"   label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 331137    Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                            @463 pass in quick on igb2.22 inet proto tcp from any to 192.168.22.5 port = ntp flags S/SA keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                            @464 pass in quick on igb2.22 inet proto tcp from any to 192.168.22.5 port 67:68 flags S/SA keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @465 pass in quick on igb2.22 inet proto tcp from any to 192.168.22.5 port = time flags S/SA keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @466 pass in quick on igb2.22 inet proto tcp from any to 192.168.22.5 port 5351:5357 flags S/SA keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @467 pass in quick on igb2.22 inet proto udp from any to 192.168.22.5 port = domain keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 218       Packets: 466       Bytes: 40867       States: 1     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 1     ]
                                              [ Last Active Time: Sat Sep 10 00:09:41 2022 ]
                                            
                                              @468 pass in quick on igb2.22 inet proto udp from any to 192.168.22.5 port = ntp keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 1         Packets: 2         Bytes: 152         States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @469 pass in quick on igb2.22 inet proto udp from any to 192.168.22.5 port 67:68 keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @470 pass in quick on igb2.22 inet proto udp from any to 192.168.22.5 port = time keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @471 pass in quick on igb2.22 inet proto udp from any to 192.168.22.5 port 5351:5357 keep state label "USER_RULE: Core Network Services (DNS/DHCP/BOOTP/etc)" label "id:1610264176" ridentifier 1610264176
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @472 block drop in quick on igb2.22 inet proto tcp from any to ! (self:18) port = domain label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 260       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @473 block drop in quick on igb2.22 inet proto tcp from any to ! (self:18) port = ntp label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 95        Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @474 block drop in quick on igb2.22 inet proto tcp from any to ! (self:18) port 67:68 label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 95        Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @475 block drop in quick on igb2.22 inet proto tcp from any to ! (self:18) port = time label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 95        Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @476 block drop in quick on igb2.22 inet proto tcp from any to ! (self:18) port 5351:5357 label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 95        Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @477 block drop in quick on igb2.22 inet proto udp from any to ! (self:18) port = domain label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 260       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @478 block drop in quick on igb2.22 inet proto udp from any to ! (self:18) port = ntp label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 165       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @479 block drop in quick on igb2.22 inet proto udp from any to ! (self:18) port 67:68 label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 165       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @480 block drop in quick on igb2.22 inet proto udp from any to ! (self:18) port = time label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 165       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @481 block drop in quick on igb2.22 inet proto udp from any to ! (self:18) port 5351:5357 label "USER_RULE: Trap External: Core Network Services (DNS/DHCP/BO..." label "id:1610264228" ridentifier 1610264228
                                              [ Evaluations: 165       Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                              @482 block return in log quick on igb2.22 inet all label "USER_RULE: Default Block VOIP IPv4+IPv6" label "id:1610264385" ridentifier 1610264385
                                              [ Evaluations: 186       Packets: 186       Bytes: 80780       States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: Sat Sep 10 00:09:41 2022 ]
                                            
                                              @483 block return in log quick on igb2.22 inet6 all label "USER_RULE: Default Block VOIP IPv4+IPv6" label "id:1610264385" ridentifier 1610264385
                                              [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
                                              [ Inserted: uid 0 pid 86711 State Creations: 0     ]
                                              [ Last Active Time: N/A ]
                                            
                                            
                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.