Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port Forwarding w/ OpenVPN Tunnel - What am I doing wrong?

    Scheduled Pinned Locked Moved NAT
    35 Posts 3 Posters 3.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      techboot @viragomann
      last edited by techboot

      @viragomann

      I must have created a second account and didn't realize Google had an account linked and stored the other. Sorry for this confusion. I will clean up the duplicate account, but don't want to delete it mid-thread.

      Yes, I changed the port number from the VPN provider... it's a static port, with the option to release and request a new one if needed.

      So basically VPN provider (AirVPN) has public IP -> private IP with assigned port to route towards it (mine, when connected with the client) -> pfsense -> local machine

      43b3f531-ddad-4611-a825-8be64dee5584-image.png

      So my running theory now is that since I am being assigned a 10.x IP by the VPN provider upon connection to them, there is something I am missing fundamentally in my config?

      V 1 Reply Last reply Reply Quote 0
      • T
        techboot @viragomann
        last edited by

        @viragomann

        Adding my outbound NAT for your reference:

        091b956c-cf2a-46d2-b58b-f095f056f83d-image.png

        1 Reply Last reply Reply Quote 0
        • V
          viragomann @techboot
          last edited by

          @techboot
          This whole thread is already pretty confusing. In the screenshot above on the VPN interface, I can see public source IP. But then you say, the provider replaces it with a private one (masquerading)...

          To get a step beyond, do a simple test, please:
          Add an outbound NAT rule for the incoming traffic:
          Interface: LAN
          source: any
          destination: <server IP>/32
          translation: interface address

          Check if you get access from outside.

          T 1 Reply Last reply Reply Quote 0
          • T
            techboot @viragomann
            last edited by

            @viragomann

            To clarify when you say "server ip" do you want the public ip as seen in the screenshot or the assigned internal IP via Masquerading?

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @techboot
              last edited by viragomann

              @techboot
              It's local IP.

              Edit:
              also flush the states after adding the rule.

              T 1 Reply Last reply Reply Quote 0
              • T
                techboot @viragomann
                last edited by

                @viragomann

                No change. To confirm:

                NAT:
                278e1196-ddc3-4de2-800b-591771b8ddee-image.png

                Outbound NAT:
                2c5e0bc5-587d-464c-83eb-7746c68c87b9-image.png

                Rules (VPN Interface)
                478e7003-ac92-4917-8e81-41408a451616-image.png

                VPN Provider Port Check Tool: (Note, telnet to the public IP from an outside IP (ie: an Azure VPS, yields the same result)
                28397b2c-c93e-4888-ad7b-291b61ee1cca-image.png

                --

                In an effort to maybe make this easier, should I delete this thread and re-make it? I will remove all of the rules, NAT, etc.. reboot for good measure and start over with all of the details / information in one post based on your feedback and comments thus far?

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @techboot
                  last edited by

                  @techboot said in Port Forwarding w/ OpenVPN Tunnel - What am I doing wrong?:

                  NAT:

                  And the mess goes on...
                  10.13.31.22 is your VPN interface address. The NAT IP has to be your internal server IP!

                  Also you should limit the destination IP. Your may set it to the interface address.

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    techboot @viragomann
                    last edited by

                    @viragomann

                    10.13.31.22 is my internal IP.

                    The 10.65.130.4 is the IP assigned by the VPN provider.

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @techboot
                      last edited by

                      @techboot
                      Ah ya. So you need to edit the outbound NAT rule and correct the destination IP.

                      T 1 Reply Last reply Reply Quote 0
                      • T
                        techboot @viragomann
                        last edited by

                        @viragomann

                        Cleared States.

                        7cf805f8-d2b9-433b-870d-eb8def925db5-image.png

                        --
                        8fb7dacc-2a54-4eaa-918e-b266c891c0d1-image.png

                        --

                        I am confused what you mean by limit the destination IP and limit to the interface address. I assume you mean on the port forward tab?

                        V 1 Reply Last reply Reply Quote 0
                        • V
                          viragomann @techboot
                          last edited by

                          @techboot said in Port Forwarding w/ OpenVPN Tunnel - What am I doing wrong?:

                          I assume you mean on the port forward tab?

                          Yes.

                          In the LAN outbound NAT rule correct the translation to interface address, please, which is the default setting.

                          T 1 Reply Last reply Reply Quote 0
                          • T
                            techboot @viragomann
                            last edited by

                            @viragomann

                            I think I have now gone and confused myself in all of this. Thank you for bearing with me.

                            Like this?

                            67d33750-6821-460f-94d2-656873739ca8-image.png

                            V 1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @techboot
                              last edited by

                              @techboot
                              destination: internal server IP with /32 mask
                              translation: LAN address

                              T 2 Replies Last reply Reply Quote 0
                              • T
                                techboot @viragomann
                                last edited by

                                @viragomann

                                37567752-4ef4-4600-9fcc-994185eabc28-image.png

                                Cleared States, No Change via Telnet or Port Tool.

                                1 Reply Last reply Reply Quote 0
                                • T
                                  techboot @viragomann
                                  last edited by techboot

                                  @viragomann

                                  Question on this...

                                  4efeded8-a1ac-4009-8685-9b7633cdd0d9-image.png

                                  These are my current OpenVPN Client (towards the VPN Provider) Settings... I was under the impression that I wanted the "Dont Pull Routes" checkbox selected, since that would otherwise set the default gateway for the whole router towards the VPN provider.

                                  In my case, I want to only route specific IP's out via the VPN, which DOES currently work.

                                  Could this actually be some of my port forward issues?

                                  Edit: this is the documentation pertain to port forwarding from the VPN provider: https://airvpn.org/faq/port_forwarding/

                                  V 1 Reply Last reply Reply Quote 0
                                  • V
                                    viragomann @techboot
                                    last edited by

                                    @techboot said in Port Forwarding w/ OpenVPN Tunnel - What am I doing wrong?:

                                    These are my current OpenVPN Client (towards the VPN Provider) Settings... I was under the impression that I wanted the "Dont Pull Routes" checkbox selected, since that would otherwise set the default gateway for the whole router towards the VPN provider.

                                    That's correct. You don't need routes, since you do policy routing for outbound traffic.

                                    Edit: this is the documentation pertain to port forwarding from the VPN provider: https://airvpn.org/faq/port_forwarding/

                                    There is nothing mentioned, that the provider does masquerading as you stated above.
                                    If he doesn't masquerading you need to enable reply-to for proper reply-routing.

                                    For a quick test if this is the issue, remove the "Don't pull routes" check, ensure that the VPN is shown as default gateway in Status > Gateway, then test the access.

                                    T 1 Reply Last reply Reply Quote 0
                                    • T
                                      techboot @viragomann
                                      last edited by

                                      @viragomann

                                      Will try shortly.

                                      To clarify, this is the only information that shows how they (provider's port check tool) works.

                                      73a892e9-8216-45c4-885b-1dc8b9172e13-image.png

                                      To me, that's public -> pfsense (as VPN client 10.65.138.204) -> LAN client (10.13.31.22)

                                      V 1 Reply Last reply Reply Quote 0
                                      • V
                                        viragomann @techboot
                                        last edited by

                                        @techboot
                                        I don't expect, that the provider knows your LAN clients IP.

                                        T 1 Reply Last reply Reply Quote 0
                                        • T
                                          techbooties @viragomann
                                          last edited by

                                          @viragomann

                                          You make a fair point. I should have been more specific, but I added my LAN client IP for completeness. Apologies there.

                                          However, with the test by disabling the don't pull routes .. success

                                          529118b1-6189-4226-8cc5-0bc261bb924e-image.png

                                          f1ae0b24-6900-4b9c-99ad-404061a3a20e-image.png

                                          Understandably now my whole LAN is out the VPN, but how would I set reply-to for the proper routing as you mentioned?

                                          V 1 Reply Last reply Reply Quote 0
                                          • V
                                            viragomann @techbooties
                                            last edited by

                                            @techbooties
                                            You need to remove the pass rule from the OpenVPN tab.

                                            If you are running an OpenVPN server come back with the info to elaborate, how you get access then.

                                            T 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.