Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSENSE WIFI CALLING

    Scheduled Pinned Locked Moved General pfSense Questions
    46 Posts 10 Posters 9.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mikeisfly @marvosa
      last edited by

      @marvosa making this change is what worked for me.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Just to be clear you should never need to open inbound ports for this. If you are blocking outbound traffic you may need to open ports there.

        1 Reply Last reply Reply Quote 1
        • msa1878M
          msa1878 @NollipfSense
          last edited by

          @nollipfsense Screen Shot 2023-01-07 at 10.10.17 AM.png Screen Shot 2023-01-07 at 10.10.36 AM.png Screen Shot 2023-01-07 at 10.10.48 AM.png Screen Shot 2023-01-07 at 10.11.04 AM.png Screen Shot 2023-01-07 at 10.11.22 AM.png

          Thank you for any advanced help with this matter. as you can see I have tried every thing

          TIm

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @msa1878
            last edited by

            @msa1878 take one phone. Create an any/any rule for that one phone in your rules. Then see if WiFi calling works. See what states it creates using pftop.

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            msa1878M 2 Replies Last reply Reply Quote 0
            • msa1878M
              msa1878 @michmoor
              last edited by msa1878

              @michmoor

              Would this rule reside on the lan rule or wan or floating? this is what I added per your suggestion.

              Tim

              Screen Shot 2023-01-07 at 11.05.52 AM.png

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @msa1878
                last edited by

                @msa1878 I’m not understanding your rules. You have two rules that permit any/any. Just seeing that, WiFi calling should work.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                msa1878M 1 Reply Last reply Reply Quote 0
                • msa1878M
                  msa1878 @michmoor
                  last edited by

                  @michmoor

                  Removed the redundant rules shown.

                  Screen Shot 2023-01-07 at 11.29.23 AM.png

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance
                    last edited by

                    @msa1878 I just wanted you to put in a new rule with the source IP being the phone you want to test BUT is WiFi calling working?

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    msa1878M 1 Reply Last reply Reply Quote 0
                    • M
                      mikeisfly @msa1878
                      last edited by

                      @msa1878

                      System -> Advance -> Firewall & NAT -> change Firewall Optimization Options to Conservative.

                      This is what worked for me. I have Verizon wireless. Before I made this change it would be hit or miss. After the change everything is working as expected.

                      M msa1878M 2 Replies Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @mikeisfly
                        last edited by

                        @mikeisfly interesting. I didn’t have to make any changes. I have VZW

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          You should not have any rules allowing that IPSec traffic inbound. So not on WAN or as Floating rules applied to WAN. All the IPSec connections for that are opened outbound.

                          The wifi calling might be trying to use some hardcoded DNS which would be blocked by your rules.

                          1 Reply Last reply Reply Quote 0
                          • msa1878M
                            msa1878 @michmoor
                            last edited by

                            @michmoor

                            Haven't checked ...the day got away from me... I will let you know later.

                            Thank you for your support in this

                            msa1878M 1 Reply Last reply Reply Quote 0
                            • msa1878M
                              msa1878 @michmoor
                              last edited by msa1878

                              @michmoor

                              I had a chance to look at this fully... my cellphone is 10.110.9.99 and I look at the pftop session and the cellphone doesn't even reach out to port 4500 or doesn't trigger a UDP port 4500 session

                              I did make a rule directly allowing 10.110.8.99 cellphone to use port 4500.

                              Screen Shot 2023-01-08 at 1.00.33 PM.png

                              Any suggestions?

                              JKnottJ chpalmerC msa1878M 3 Replies Last reply Reply Quote 0
                              • JKnottJ
                                JKnott @msa1878
                                last edited by

                                @msa1878 said in PFSENSE WIFI CALLING:

                                Any suggestions?

                                Run packet capture, filtering on the IP or MAC address, to see what's happening.

                                PfSense running on Qotom mini PC
                                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                UniFi AC-Lite access point

                                I haven't lost my mind. It's around here...somewhere...

                                1 Reply Last reply Reply Quote 0
                                • chpalmerC
                                  chpalmer @msa1878
                                  last edited by chpalmer

                                  @msa1878

                                  Have you looked at your existing states and filtered them based on your phones IP address?

                                  Are all 238 of your wolves using the same carrier? They will probably be all a little different..

                                  Also- is your subnet big enough for all these "customers"? Some of them may not even be connecting if not..

                                  Triggering snowflakes one by one..
                                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                                  msa1878M 1 Reply Last reply Reply Quote 0
                                  • msa1878M
                                    msa1878 @chpalmer
                                    last edited by msa1878

                                    @chpalmer

                                    The system with 3.2 intel and 16 gigs of ram and 150 gig HD with. Public IP wan attached directly is working with 230 student logged on with maybe two devices between each of them during the day.

                                    On weeknights and weekends, it's about 80 students. Side note... I didn't notice this issue or received any reports of this issue until I turned on captive portal and require all students to authenticate against Google Gsuite secure Ldap services. I also installed snort and PFblocker and have since turn these off, except for the captive portal due to this issue. The campus has all sorts of carriers but Verizon is the primary Im dealing with for now.

                                    These add-ons should not have any reason why wifi calling shouldn't work.

                                    Someone correct me if I'm missing something

                                    Tim

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Did you try allowing external DNS requests? Or logging blocked DNS requests?

                                      msa1878M 1 Reply Last reply Reply Quote 0
                                      • msa1878M
                                        msa1878 @mikeisfly
                                        last edited by

                                        @mikeisfly

                                        I check that and it is set as you suggested.

                                        1 Reply Last reply Reply Quote 0
                                        • msa1878M
                                          msa1878 @stephenw10
                                          last edited by

                                          @stephenw10

                                          We are using external dns services but I have the server rule allowing PFsense dns only and blocking all other dns server request just in case a student tries to change his dns to outwit my firewall.

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Yes, I see that but if, for example, the wifi calling app is hard coded to use 8.8.8.8 if will fail. You should add DNS redirect as well as just blocking it to be sure.
                                            https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html

                                            The fact you are not seeing any port 4500 traffic implies it's not even trying which could be a DNS problem. You should also check for port 500 traffic though.

                                            Steve

                                            JKnottJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.