Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing/INterface/Gateway issues after updating from CE 2.7 -> 2.71

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 3 Posters 2.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      A VPN gateway like that is dynamic so you would expect to see it empty like that before the VPN connects. But as soon as it connects it should regenerate the rules to include that.
      That only happens for an assigned interface.
      Did the interface or gateway get renamed?

      Try running Status > Filter Reload and then rechecking.

      1 Reply Last reply Reply Quote 0
      • D
        digdug3
        last edited by

        I did some other tests. Looks like routing to VPN gateway from the default LAN is working.
        Routing to the VPN gateway from another subnet or VLAN is not.

        All firewall rules are still the same as they were upgrading from 2.6.0 to 2.7.0 and started after upgrading to 2.7.1

        Status > Filter Reload did not help, interface and gateway still have the same name. Nothing has changed since 2.6.0

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by stephenw10

          Ok check the rulset file in /tmp/rules.debug.

          Do you have the VPN gateway populated?

          Is that also added to the policy routing rules on LAN? On other internal interfaces?

          Trying to replicate this here now.

          D 3 Replies Last reply Reply Quote 0
          • D
            digdug3 @stephenw10
            last edited by

            @stephenw10 Yes, it is populated.

            GWPRIVATEVPN_VPNV4 = " route-to ( ovpnc2 10.32.x.x ) "
            nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535  # VLANVPN to PRIVATEVPN
            pass  in  quick  on $VLANVPN  $GWPRIVATEVPN_VPNV4 inet proto { tcp udp }  from $OPT12__NETWORK to any ridentifier 1496691583 keep state label "USER_RULE: VLANVPN to PRIVATEVPN outgoing ports IP4 TCP/UDP" label "id:1496691583" label "gw:PRIVATEVPN_VPNV4"
            pass  in  quick  on $VLANVPN  $GWPRIVATEVPN_VPNV4 inet proto icmp  from $OPT12__NETWORK to any icmp-type echoreq ridentifier 1502282393 keep state label "USER_RULE: VLANVPN to PRIVATEVPN outgoing ports ICMP" label "id:1502282393" label "gw:PRIVATEVPN_VPNV4"
            
            
            1 Reply Last reply Reply Quote 0
            • D
              digdug3 @stephenw10
              last edited by digdug3

              @stephenw10 And for the LAN

              nat on $PRIVATEVPN inet from 192.168.1.0/24 to any -> 10.32.x.x/32 port 1024:65535  # LAN to PRIVATEVPN
              pass  in  quick  on $LAN  $GWPRIVATEVPN_VPNV4 inet from $VPNClients to any ridentifier 1422085516 keep state label "USER_RULE: LAN to PRIVATEVPN outgoing ports IP4" label "id:1422085516" label "gw:PRIVATEVPN_VPNV4"
              
              1 Reply Last reply Reply Quote 0
              • D
                digdug3 @stephenw10
                last edited by

                @stephenw10 Did see the difference between the LAN and VLAN rule. Then changed TCP/UDP in the VPN VLAN rule to * and it looks like it's working now, also from a subnet.
                Why?

                D 1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  How are you testing?

                  1 Reply Last reply Reply Quote 0
                  • D
                    digdug3 @digdug3
                    last edited by digdug3

                    @digdug3 said in Routing/INterface/Gateway issues after updating from CE 2.7 -> 2.71:

                    @stephenw10 Did see the difference between the LAN and VLAN rule. Then changed TCP/UDP in the VPN VLAN rule to * and it looks like it's working now, also from a subnet.
                    Why?

                    No looks like it does not work again. Probably due to a reload.
                    Saw another post about the NAT rules. I did have a disabled OPT1, the nat rule was directly after it:

                    scrub on $PRIVATEVPN2 inet6 all    fragment reassemble
                    # Missing interface 'opt1' for rule 'LAN to OPT1'nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535  # VLANVPN to PRIVATEVPN
                    nat on $PRIVATEVPN inet from 192.168.1.0/24 to any -> 10.32.x.x/32 port 1024:65535  # LAN to PRIVATEVPN
                    

                    Totally removed the interface, also from hybrid NAT generated rules and the VPN works again...
                    Now the debug looks like:

                    scrub on $PRIVATEVPN2 inet6 all    fragment reassemble
                    nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535  # VLANVPN to PRIVATEVPN
                    nat on $PRIVATEVPN inet from 192.168.1.0/24 to any -> 10.32.x.x/32 port 1024:65535  # LAN to PRIVATEVPN
                    

                    And it works again.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      @digdug3 said in Routing/INterface/Gateway issues after updating from CE 2.7 -> 2.71:

                      Missing interface 'opt1' for rule 'LAN to OPT1'nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535 # VLANVPN to PRIVATEVPN

                      Aha, looks like a missing /n somewhere. Hmmm

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Did you have outbound NAT in manual mode? In hybrid mode the auto rules should still have translated that.

                        D 1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Added a bug to track: https://redmine.pfsense.org/issues/15024

                          1 Reply Last reply Reply Quote 1
                          • D
                            digdug3 @stephenw10
                            last edited by

                            @stephenw10 I've always had them in "Hybrid Outbound NAT" mode.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Hmm, then I would have expected the auto rules to apply that translation even if the manual rule you added was not being applied.

                              Do you see an equivalent rule in the listed out OBN rules?

                              D 1 Reply Last reply Reply Quote 0
                              • D
                                digdug3 @stephenw10
                                last edited by digdug3

                                @stephenw10 Just checked the OBN rules again and the VPN nat rule was added manually (years ago):
                                obn.png
                                No other rules were commented out.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  If it's in hybrid mode though you should also have auto rules added for the VLANVPN subnet on the PrivateVPN interface. They should be shown below the manual rules.

                                  D 1 Reply Last reply Reply Quote 0
                                  • D
                                    digdug3 @stephenw10
                                    last edited by

                                    @stephenw10 No, they aren't, probably because the VPN client has "Don't pull routes" checked. I also only want these rules for two of my subnets, not all of them.

                                    Next "issue" I found was when deleting an interface the manual created OBN rule wasn't removed (just like the firewall rules). It should be easy to replicate.

                                    And last, the comment in the debug said "missing interface", shouldn't it be "disabled interface" when the interface is disabled?
                                    "missing" is more correct when the interface is deleted but the manual OBN rule is still there.

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      The pf process doesn't see any difference between disabled or entirely removed interfaces. It just sees referenced to an interface that isn't defined.

                                      It is interesting that it's not removed like a firewall rule would be though.

                                      D 1 Reply Last reply Reply Quote 0
                                      • D
                                        digdug3 @stephenw10
                                        last edited by

                                        @stephenw10 At least it's fixed now for me and looks like the missing /n after the "missing interface" comment was the culprit.

                                        1 Reply Last reply Reply Quote 1
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.