Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSENSE WIFI CALLING

    Scheduled Pinned Locked Moved General pfSense Questions
    46 Posts 10 Posters 9.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NollipfSenseN
      NollipfSense @msa1878
      last edited by

      @msa1878 Can you please show your IPSec and firewall setup?

      pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
      pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

      msa1878M 1 Reply Last reply Reply Quote 0
      • M
        marvosa @msa1878
        last edited by marvosa

        @msa1878 I've never had this issue, but I've seen posts online that suggest going to System -> Advanced -> Firewall & NAT and switching the "Firewall Optimization Options" from Normal to Conservative has resolved this issue for others.

        Other posts have suggested that manually changing the "UDP Multiple" timeout setting from 60 to 900 may achieve the same result. Also located in System -> Advanced -> Firewall & NAT under the "State Timeouts" section.

        M 1 Reply Last reply Reply Quote 1
        • JKnottJ
          JKnott @msa1878
          last edited by

          @msa1878

          I use Wifi calling with pfSense and no problems here. Also, it's not plain IPSec. It's encapsulated in UDP, to get through NAT.

          Here is some info that may help:
          What are the firewall required ports for wifi-calling?

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 1
          • chpalmerC
            chpalmer @msa1878
            last edited by

            You might need "static port" depending on your carrier as well..

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance
              last edited by michmoor

              Because its reaching out over UDP:4500 , maybe firewall rules are blocking it?

              For example, my IoT vlan which my phone sits in has the following session. The rules for this vlan is pretty much any/any to the internet.

              8672bd66-b87a-4aab-9fa4-1783316a8e1a-image.png

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • T
                Tzvia
                last edited by Tzvia

                I remember when I had Sprint, I had to open a few ports for cell phone wifi calling... UDP ports 500, 4500, and 5061. I don't have an any-any rule so had to specify those. Check with your carrier, hopefully they can provide info on what they need open. I had to set 'Firewall Optimization' to conservative for Cisco Jabber 'soft-phone' calling and opened a handful of ports for that too, that I got from Cisco. Then work switched to Zoom phone, had to open a few more ports for that... So yea check with the carrier or soft-phone provider if there are high number ports that need to be open.
                And to clarify, yes outbound ports... As I mentioned I have no any-any rule, and assumed same with the OP as he wouldn't need to open anything if he did...

                Tzvia

                Current build:
                Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
                16 gigs ram
                500gig WD Blue nvme
                Using modded BIOS (enabled CSTATES)
                PFSense 2.72-RELEASE
                Enabled Intel SpeedShift
                Snort
                PFBlockerNG
                LAN and 5 VLANS

                1 Reply Last reply Reply Quote 1
                • M
                  mikeisfly @marvosa
                  last edited by

                  @marvosa making this change is what worked for me.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Just to be clear you should never need to open inbound ports for this. If you are blocking outbound traffic you may need to open ports there.

                    1 Reply Last reply Reply Quote 1
                    • msa1878M
                      msa1878 @NollipfSense
                      last edited by

                      @nollipfsense Screen Shot 2023-01-07 at 10.10.17 AM.png Screen Shot 2023-01-07 at 10.10.36 AM.png Screen Shot 2023-01-07 at 10.10.48 AM.png Screen Shot 2023-01-07 at 10.11.04 AM.png Screen Shot 2023-01-07 at 10.11.22 AM.png

                      Thank you for any advanced help with this matter. as you can see I have tried every thing

                      TIm

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @msa1878
                        last edited by

                        @msa1878 take one phone. Create an any/any rule for that one phone in your rules. Then see if WiFi calling works. See what states it creates using pftop.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        msa1878M 2 Replies Last reply Reply Quote 0
                        • msa1878M
                          msa1878 @michmoor
                          last edited by msa1878

                          @michmoor

                          Would this rule reside on the lan rule or wan or floating? this is what I added per your suggestion.

                          Tim

                          Screen Shot 2023-01-07 at 11.05.52 AM.png

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            michmoor LAYER 8 Rebel Alliance @msa1878
                            last edited by

                            @msa1878 I’m not understanding your rules. You have two rules that permit any/any. Just seeing that, WiFi calling should work.

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            msa1878M 1 Reply Last reply Reply Quote 0
                            • msa1878M
                              msa1878 @michmoor
                              last edited by

                              @michmoor

                              Removed the redundant rules shown.

                              Screen Shot 2023-01-07 at 11.29.23 AM.png

                              M 1 Reply Last reply Reply Quote 0
                              • M
                                michmoor LAYER 8 Rebel Alliance
                                last edited by

                                @msa1878 I just wanted you to put in a new rule with the source IP being the phone you want to test BUT is WiFi calling working?

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                msa1878M 1 Reply Last reply Reply Quote 0
                                • M
                                  mikeisfly @msa1878
                                  last edited by

                                  @msa1878

                                  System -> Advance -> Firewall & NAT -> change Firewall Optimization Options to Conservative.

                                  This is what worked for me. I have Verizon wireless. Before I made this change it would be hit or miss. After the change everything is working as expected.

                                  M msa1878M 2 Replies Last reply Reply Quote 0
                                  • M
                                    michmoor LAYER 8 Rebel Alliance @mikeisfly
                                    last edited by

                                    @mikeisfly interesting. I didn’t have to make any changes. I have VZW

                                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                    Routing: Juniper, Arista, Cisco
                                    Switching: Juniper, Arista, Cisco
                                    Wireless: Unifi, Aruba IAP
                                    JNCIP,CCNP Enterprise

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      You should not have any rules allowing that IPSec traffic inbound. So not on WAN or as Floating rules applied to WAN. All the IPSec connections for that are opened outbound.

                                      The wifi calling might be trying to use some hardcoded DNS which would be blocked by your rules.

                                      1 Reply Last reply Reply Quote 0
                                      • msa1878M
                                        msa1878 @michmoor
                                        last edited by

                                        @michmoor

                                        Haven't checked ...the day got away from me... I will let you know later.

                                        Thank you for your support in this

                                        msa1878M 1 Reply Last reply Reply Quote 0
                                        • msa1878M
                                          msa1878 @michmoor
                                          last edited by msa1878

                                          @michmoor

                                          I had a chance to look at this fully... my cellphone is 10.110.9.99 and I look at the pftop session and the cellphone doesn't even reach out to port 4500 or doesn't trigger a UDP port 4500 session

                                          I did make a rule directly allowing 10.110.8.99 cellphone to use port 4500.

                                          Screen Shot 2023-01-08 at 1.00.33 PM.png

                                          Any suggestions?

                                          JKnottJ chpalmerC msa1878M 3 Replies Last reply Reply Quote 0
                                          • JKnottJ
                                            JKnott @msa1878
                                            last edited by

                                            @msa1878 said in PFSENSE WIFI CALLING:

                                            Any suggestions?

                                            Run packet capture, filtering on the IP or MAC address, to see what's happening.

                                            PfSense running on Qotom mini PC
                                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                            UniFi AC-Lite access point

                                            I haven't lost my mind. It's around here...somewhere...

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.