Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing from subnet does not belong to pfsense

    Scheduled Pinned Locked Moved Firewalling
    37 Posts 4 Posters 3.0k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      Josifbg 0 @johnpoz
      last edited by

      @johnpoz Thanks for your response.

      So how would you explain that behind pfsense the client is not able to ping other nodes and to be pinged by any other nodes, but without pfsense there is no such issue at all?

      johnpozJ J 2 Replies Last reply Reply Quote 0
      • johnpozJ Offline
        johnpoz LAYER 8 Global Moderator @Josifbg 0
        last edited by johnpoz

        @josifbg-0 they are not routing through the tunnel then.. If they are hole punching, then you would have to allow the actual connection outbound in the first place to allow for the whole punch. Maybe the port has to be static for what they are trying to do with the hole punch.

        But traffic flowing though that tunnel pfsense has zero to do with any of that traffic.. Not unless pfsense was the actual endpoint in the vpn could it control traffic in or out of the tunnel.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

        J 1 Reply Last reply Reply Quote 0
        • J Offline
          Josifbg 0 @Josifbg 0
          last edited by

          here are some logs:

          WAN udp 94.XX.XX.XX:13355 (192.168.20.125:51821) -> 18.192.50.92:45328 SINGLE:NO_TRAFFIC 901 / 0 155 KiB / 0 B

          johnpozJ 1 Reply Last reply Reply Quote 0
          • J Offline
            Josifbg 0 @johnpoz
            last edited by

            @johnpoz I totally agree with you and it was strange for me as well why this is happening.
            "then you would have to allow the actual connection outbound " -> well this got to my mind as well but I am not sure which connection to open and where in the pfSense

            1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @Josifbg 0
              last edited by johnpoz

              @josifbg-0 said in Routing from subnet does not belong to pfsense:

              WAN udp 94.XX.XX.XX:13355 (192.168.20.125:51821) -> 18.192.50.92:45328 SINGLE:NO_TRAFFIC 901 / 0 155 KiB / 0 B

              That is client 20.125 leaving psense wan - it gets no answer - how is that a pfsense thing? But notice your port on wan left at 13355 but the client source was 51821.. If in that udp packet it told this 18.192 box to come back on port 51821 - pfsense would not allow that traffic because it would be out of state an not able to hole punch.

              You would need to set a static nat on such traffic - where pfsense when it nats it, if the source is 51821, when it leaves pfsense wan it would stay 51821 vs being port natted to that 13355 port.

              https://docs.netgate.com/pfsense/en/latest/nat/outbound.html#static-port

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

              J 1 Reply Last reply Reply Quote 0
              • J Offline
                Josifbg 0 @johnpoz
                last edited by

                @johnpoz This totally makes sense.

                So I have to create static port 51821 right?

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator @Josifbg 0
                  last edited by

                  @josifbg-0 If that is the port your vpn client is going to use to tell the other site/client how to hole punch back directly to him yes.. Is there a setting for that port in the client?

                  Its a horrible design flaw in such clients... The other end that is going to hole punch back should just use the port it got the traffic from.. In your example that 13355 port..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                  J 2 Replies Last reply Reply Quote 0
                  • J Offline
                    Josifbg 0 @johnpoz
                    last edited by Josifbg 0

                    @johnpoz From the Server side ... the Netmaker Server I am able to control that for the whole network or per each node/client

                    So, Yes I can make changes to the client, but again I am not really sure how to set it up in pfsense....

                    Here are some rulz I`ve created but still not working

                    the Outbound rule:
                    Screenshot 2022-12-31 at 2.49.41.png
                    the port forward rule:
                    Screenshot 2022-12-31 at 2.50.08.png

                    Here are the changes to the client/Node in the Netmaker server:
                    Screenshot 2022-12-31 at 2.52.26.png

                    1 Reply Last reply Reply Quote 0
                    • J Offline
                      Josifbg 0 @johnpoz
                      last edited by

                      @johnpoz I did it! I guess I did it 😄

                      Here are the final changes which has to be made in pfSense:

                      The Outbound Rule:
                      Screenshot 2022-12-31 at 3.01.24.png

                      And some changes to the node which is behind pfSense in Netmaker Server:
                      Screenshot 2022-12-31 at 2.52.26.png

                      That`s it!

                      Thank you @johnpoz! you`ve made my day :)

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ Offline
                        johnpoz LAYER 8 Global Moderator @Josifbg 0
                        last edited by

                        @josifbg-0 so working for you - did you change the port, your posting showing the 192 box using 51821, but what you posted shows port 51825?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                        J 1 Reply Last reply Reply Quote 0
                        • J Offline
                          Josifbg 0 @johnpoz
                          last edited by

                          @johnpoz Yes, the port is changed everywhere.

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ Offline
                            johnpoz LAYER 8 Global Moderator @Josifbg 0
                            last edited by

                            @josifbg-0 glad you got it sorted not a fan really of such methods. If they want to whole punch that is fine - but there is little reason to require a specific source port - just use the port the device talked you from. This allows for napt.. But if you know what the listen port is - you don't have to use hole punching, could just port forward those ports on the different locations.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                            J 1 Reply Last reply Reply Quote 0
                            • J Offline
                              Josifbg 0 @johnpoz
                              last edited by

                              @johnpoz Well the main reason for hole punching is that the port can be dynamic and the second reason is not to open any ports on your router.

                              This way you are able to securely create private tunnels between sites without opening any ports on your router.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ Offline
                                johnpoz LAYER 8 Global Moderator @Josifbg 0
                                last edited by johnpoz

                                @josifbg-0 said in Routing from subnet does not belong to pfsense:

                                hole punching is that the port can be dynamic

                                Not when the router does napt and changes the source port - that is my point.. There is no reason for the place your talking to can't just use the port it got traffic from to hole punch back.. As in your example the client behind pfsense used port 51821, but pfsense changed that port using napt to 13355 etc.. The whole punch would of worked if the answer would of came in on that port, etc.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                                1 Reply Last reply Reply Quote 0
                                • M Offline
                                  moussa854 @Josifbg 0
                                  last edited by moussa854

                                  @josifbg-0 Sorry for the late reply. I tried to replicate your setting but for some reason it did not work for me. Hope this may help others. Other user told me in the past to set the netmaker server as a relay for all of the other nodes. After doing so, you do not have to make any changes to pfsense but still able to ping and SSH to all nodes.

                                  Firewall >> NAT >> Outbound >> automatic
                                  

                                  No special rule in the firewall

                                  At the Netmaker, the server node is a Relay
                                  Done

                                  Now I can access my home and work wherever I am at without opening any port and doing NAT'ing

                                  Netmaker.png

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ Offline
                                    johnpoz LAYER 8 Global Moderator @moussa854
                                    last edited by

                                    @moussa854 said in Routing from subnet does not belong to pfsense:

                                    netmaker server as a relay for all of the other nodes

                                    In that mode all traffic would go through the tunnels the clients have setup.. No hole punching would be used.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                                    M 1 Reply Last reply Reply Quote 1
                                    • M Offline
                                      moussa854 @johnpoz
                                      last edited by

                                      Thank you, I tested it with no hole punching and I am still able to ping all nodes. I fixed my post. Thanks @johnpoz

                                      F 1 Reply Last reply Reply Quote 0
                                      • F Offline
                                        falexbr @moussa854
                                        last edited by falexbr

                                        @moussa854 I came to the same problem and after a lot of trial and error I found out that in order to UDP hole punch to work with pfsense you need to set Static Port on NAT outbound.
                                        From the menu Firewall > NAT > Outbound select Mode = Manual and edit the auto created rule LAN to WAN and set static port.
                                        Now everything should work ;)

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.