Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bypass VPN VLAN to external IP?

    Scheduled Pinned Locked Moved General pfSense Questions
    27 Posts 3 Posters 838 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @SubSeven
      last edited by

      @SubSeven said in Bypass VPN VLAN to external IP?:

      So would you say that I don't need to do anything with NAT though?

      Presumed, you have a gateway stated in the WAN interface settings and with outbound NAT in hybrid mode, pfSense nats traffic leaving the WAN to the WAN address automatically. So no further settings needed.

      Automatically created outbound NAT rules are listed below the manual rules.

      1 Reply Last reply Reply Quote 0
      • S
        SubSeven @stephenw10
        last edited by

        @stephenw10 Ok, thanks. I took out the firewall rule that had called for the WAN gateway, so it just looks like this now but still doesn't work:

        24ef1df3-a6aa-43e8-93ea-5b9a265f8968-image.png

        @viragomann I kind of thought that, I took out the outbound NAT entry again. So now it looks like this but still doesn't work and I assume the portion in the yellow square is what you were referring to:

        4e0b597b-56ef-4ab7-b3a1-522606f9b946-image.png

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Check the state table in Diag > States while you're pinging.

          S 2 Replies Last reply Reply Quote 1
          • S
            SubSeven
            last edited by

            Btw. I don't know if this means anything but under diagnostics/routes, I don't see 192.168.99.106 listed and I also don't see it under diagnostics/states or diagnostics/states summary.

            I played around in diagnostics and found this port test and it succeeded, so at least that part works.

            25657711-6b69-4515-ab56-f423b83dc7ea-image.png

            3b53179c-9185-4881-9996-b5e44ae0cbca-image.png

            The ping also worked.

            1 Reply Last reply Reply Quote 0
            • S
              SubSeven @stephenw10
              last edited by SubSeven

              @stephenw10 Ok, I did that and something did show up:

              efe61ac5-a712-4a49-9ff4-3d6cf0884c5c-image.png

              1 Reply Last reply Reply Quote 0
              • S
                SubSeven @stephenw10
                last edited by

                @stephenw10 I don't know if this helps, but below is the same thing with ping happening, and trying to access web interface on port 80 and on port 8080:

                50159ae3-4884-4497-946a-dab4606d5a1a-image.png

                I also tried turning off the firewall on the server:
                sudo ufw disable
                Firewall stopped and disabled on system startup

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Ok so that is the incoming state. There should be an outgoing state on WAN too.

                  If it's not going out of the WAN there may be firewall rules preventing it. Or there may be no route.

                  You said you don't see a route but the WAN should be in that subnet. What do you see in the routing table?

                  S 1 Reply Last reply Reply Quote 1
                  • S
                    SubSeven @stephenw10
                    last edited by

                    @stephenw10 I really appreciate you helping me btw.

                    For the WAN rules there are these:
                    e764d9a4-884a-4db6-ae53-29e80d023208-image.png

                    All the tables seem to be pretty empty, unless I'm looking at the wrong thing:
                    9b7f94b8-396a-4cac-a491-543e0204e38e-image.png

                    2405f80a-b2ad-44fc-ab0a-29a864ef238f-image.png

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Diag > Routes is where the routing table is.

                      The rules that might block that would be outgoing so on the floating tab. Unlikely there are any.

                      If you have an IPSec VPNs defined that might be grabbing the traffic.

                      S 2 Replies Last reply Reply Quote 1
                      • S
                        SubSeven @stephenw10
                        last edited by

                        @stephenw10 my bad!

                        The floating rules are empty yes.

                        This is what is under routes for IPv4 and 192.168.99.106 is not on the list:
                        b7b243cb-ebac-4db5-b833-6dbe005788e4-image.png

                        1 Reply Last reply Reply Quote 0
                        • S
                          SubSeven @stephenw10
                          last edited by

                          @stephenw10 I don't know if this helps but here are all the rules:

                          65687b28-bc48-464f-8567-7d84cb465bb5-image.png

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Hmm, well it correctly shows the 192.168.99.0/24 subnet on the igc0 interface directly so it should send that traffic to it.

                            Something must be blocking it. I'd check IPSec tunnels.

                            S 1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by stephenw10

                              Try pinging it from the firewall but setting the source to the OPT9 address then check the states.

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                SubSeven @stephenw10
                                last edited by

                                @stephenw10 Those look empty. I'm going to restart pfSense to see if that does anything and I'll also restart the Win PC and the Linux server.

                                e09265b7-d3de-4587-8129-e3cfabc332d9-image.png

                                1 Reply Last reply Reply Quote 1
                                • S
                                  SubSeven @stephenw10
                                  last edited by

                                  @stephenw10 I powered all 3 down, started pfSense back up, then Linux server, and then the Win 10 PC but the good old "restart your computer" trick didn't help :)

                                  I tried the ping and that seems to work:
                                  b8f6f804-d384-4ef2-8ea0-a5d555587027-image.png

                                  At the same time I was doing that I checked the states again and saw an entry for ...99.106:
                                  64929a20-d41a-474f-ba29-98ae96218782-image.png

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Ok, so that is translating as expected.

                                    One thing I see is that pfSense has two IP addresses in that subnet, 192.168.99.99 and 192.168.99.200. Which of those is the WAN address?

                                    S 3 Replies Last reply Reply Quote 0
                                    • S
                                      SubSeven @stephenw10
                                      last edited by

                                      @stephenw10 192.168.99.99 is the gateway of the parent router, it is part of my old / original network which I want to eventually get rid of. That one is running OpnSense.

                                      c430f4fb-8bd8-4d61-8445-00e40a445452-image.png

                                      I access it from what I labeled as test PC (...99.111):
                                      b800ba5c-165b-4518-9845-3f4f6573e9ad-image.png

                                      To get to the pfSense PC we've been talking about, I would go to 192.168.99.200 so that tells me that is the WAN IP.

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        SubSeven @stephenw10
                                        last edited by SubSeven

                                        @stephenw10 I also wanted to share the details of the outbound NAT that is used for the VPN in case there is something in there.

                                        84e39584-4a2a-4ed3-b1fd-bd00cc856d67-image.png

                                        851ad1dd-93c8-4596-bb91-2c5e44ddbed5-image.png

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          SubSeven @stephenw10
                                          last edited by

                                          @stephenw10 Just in case this is helpful:

                                          b7f96bd3-267e-48f4-ac76-4d475e1219d8-image.png

                                          58da8b90-b9e7-465c-a95c-bd104f8f84d4-image.png

                                          4b5f2a15-c5a4-46e5-a87d-594304b7f8c7-image.png

                                          b39e5dc7-78c6-452f-9bab-9a4f984e1802-image.png

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Ah I see. Yes that all looks OK. That outbound NAT rule is not in play here since traffic isn't leaving via the VPN.

                                            It feels like the incoming rule on OPT9 is preventing it open the WAN state somehow. If you disable the policy routing rule and just pass traffic there without a gateway does it work?

                                            S 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.