Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bypass VPN VLAN to external IP?

    Scheduled Pinned Locked Moved General pfSense Questions
    27 Posts 3 Posters 838 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SubSeven @stephenw10
      last edited by SubSeven

      @stephenw10 Ok, I did that and something did show up:

      efe61ac5-a712-4a49-9ff4-3d6cf0884c5c-image.png

      1 Reply Last reply Reply Quote 0
      • S
        SubSeven @stephenw10
        last edited by

        @stephenw10 I don't know if this helps, but below is the same thing with ping happening, and trying to access web interface on port 80 and on port 8080:

        50159ae3-4884-4497-946a-dab4606d5a1a-image.png

        I also tried turning off the firewall on the server:
        sudo ufw disable
        Firewall stopped and disabled on system startup

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Ok so that is the incoming state. There should be an outgoing state on WAN too.

          If it's not going out of the WAN there may be firewall rules preventing it. Or there may be no route.

          You said you don't see a route but the WAN should be in that subnet. What do you see in the routing table?

          S 1 Reply Last reply Reply Quote 1
          • S
            SubSeven @stephenw10
            last edited by

            @stephenw10 I really appreciate you helping me btw.

            For the WAN rules there are these:
            e764d9a4-884a-4db6-ae53-29e80d023208-image.png

            All the tables seem to be pretty empty, unless I'm looking at the wrong thing:
            9b7f94b8-396a-4cac-a491-543e0204e38e-image.png

            2405f80a-b2ad-44fc-ab0a-29a864ef238f-image.png

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Diag > Routes is where the routing table is.

              The rules that might block that would be outgoing so on the floating tab. Unlikely there are any.

              If you have an IPSec VPNs defined that might be grabbing the traffic.

              S 2 Replies Last reply Reply Quote 1
              • S
                SubSeven @stephenw10
                last edited by

                @stephenw10 my bad!

                The floating rules are empty yes.

                This is what is under routes for IPv4 and 192.168.99.106 is not on the list:
                b7b243cb-ebac-4db5-b833-6dbe005788e4-image.png

                1 Reply Last reply Reply Quote 0
                • S
                  SubSeven @stephenw10
                  last edited by

                  @stephenw10 I don't know if this helps but here are all the rules:

                  65687b28-bc48-464f-8567-7d84cb465bb5-image.png

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, well it correctly shows the 192.168.99.0/24 subnet on the igc0 interface directly so it should send that traffic to it.

                    Something must be blocking it. I'd check IPSec tunnels.

                    S 1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by stephenw10

                      Try pinging it from the firewall but setting the source to the OPT9 address then check the states.

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        SubSeven @stephenw10
                        last edited by

                        @stephenw10 Those look empty. I'm going to restart pfSense to see if that does anything and I'll also restart the Win PC and the Linux server.

                        e09265b7-d3de-4587-8129-e3cfabc332d9-image.png

                        1 Reply Last reply Reply Quote 1
                        • S
                          SubSeven @stephenw10
                          last edited by

                          @stephenw10 I powered all 3 down, started pfSense back up, then Linux server, and then the Win 10 PC but the good old "restart your computer" trick didn't help :)

                          I tried the ping and that seems to work:
                          b8f6f804-d384-4ef2-8ea0-a5d555587027-image.png

                          At the same time I was doing that I checked the states again and saw an entry for ...99.106:
                          64929a20-d41a-474f-ba29-98ae96218782-image.png

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Ok, so that is translating as expected.

                            One thing I see is that pfSense has two IP addresses in that subnet, 192.168.99.99 and 192.168.99.200. Which of those is the WAN address?

                            S 3 Replies Last reply Reply Quote 0
                            • S
                              SubSeven @stephenw10
                              last edited by

                              @stephenw10 192.168.99.99 is the gateway of the parent router, it is part of my old / original network which I want to eventually get rid of. That one is running OpnSense.

                              c430f4fb-8bd8-4d61-8445-00e40a445452-image.png

                              I access it from what I labeled as test PC (...99.111):
                              b800ba5c-165b-4518-9845-3f4f6573e9ad-image.png

                              To get to the pfSense PC we've been talking about, I would go to 192.168.99.200 so that tells me that is the WAN IP.

                              1 Reply Last reply Reply Quote 0
                              • S
                                SubSeven @stephenw10
                                last edited by SubSeven

                                @stephenw10 I also wanted to share the details of the outbound NAT that is used for the VPN in case there is something in there.

                                84e39584-4a2a-4ed3-b1fd-bd00cc856d67-image.png

                                851ad1dd-93c8-4596-bb91-2c5e44ddbed5-image.png

                                1 Reply Last reply Reply Quote 0
                                • S
                                  SubSeven @stephenw10
                                  last edited by

                                  @stephenw10 Just in case this is helpful:

                                  b7f96bd3-267e-48f4-ac76-4d475e1219d8-image.png

                                  58da8b90-b9e7-465c-a95c-bd104f8f84d4-image.png

                                  4b5f2a15-c5a4-46e5-a87d-594304b7f8c7-image.png

                                  b39e5dc7-78c6-452f-9bab-9a4f984e1802-image.png

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Ah I see. Yes that all looks OK. That outbound NAT rule is not in play here since traffic isn't leaving via the VPN.

                                    It feels like the incoming rule on OPT9 is preventing it open the WAN state somehow. If you disable the policy routing rule and just pass traffic there without a gateway does it work?

                                    S 1 Reply Last reply Reply Quote 0
                                    • S
                                      SubSeven @stephenw10
                                      last edited by

                                      @stephenw10

                                      I "grayed that out", I'm pretty sure that's what you mean.

                                      5b6cea88-0b81-4ad3-90f9-d95996b3ba67-image.png

                                      I was still having no luck and I tried something else which is another PC, coming in from VLAN20 and I put in the following rule:

                                      aea82cfb-8d83-45a5-a02b-410b25c20db7-image.png

                                      However I'm not able to access the internet, or ...99.99, or 99.106 and VLAN20 should have nothing to do with the VPN. Granted I should have tried this much sooner. I must have something else going on and I just feel awful for taking up your time. I still think it's related to pfSense and not something external like switches or parent router. I'm just going to keep trying stuff and if nothing works I will in the end reinstall pfSense from scratch, if it comes to that but there are lots of things I will try before that. Once I get it to work, I will let you know about it.
                                      If there is anything you would like me to try by all means I'd be happy to but I don't want to take up anymore of your time and let me just say that I appreciate all your help so much!

                                      V 1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        Same symptoms? No outbound state at all?

                                        1 Reply Last reply Reply Quote 0
                                        • V
                                          viragomann @SubSeven
                                          last edited by

                                          This post is deleted!
                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.