Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Strange Routing Issue

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 4.8k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      ahole4sure @stephenw10
      last edited by ahole4sure

      @stephenw10
      No I meant that I didn't know I could establish a peer to site with the peer being behind CGNAT (in pfsense). -- is that what you are saying that I should be able to do that ?
      But does that allow access from the non CGNAT site into the network of the CGNAT site ??

      1 Reply Last reply Reply Quote 0
      • stephenw10S Online
        stephenw10 Netgate Administrator
        last edited by

        It's still site to site it's just that the tunnel can only be established from the side behind CGNAT. But, yes, once the tunnel is established connections can be opened across it both ways.

        A 1 Reply Last reply Reply Quote 0
        • A Offline
          ahole4sure @stephenw10
          last edited by

          @stephenw10

          Thanks as always for your help!!!!

          I am back to the setup again - and still trying to get past the same issue that I had initially (whhere I can't seem to get a hanshake)

          I have a screenshot of the status page of the device that is behind CGNAT that should be initiating the tunnel

          I relaize that there are many things like the WAN rule allowing 51825 in , etc
          But is there a good way to troubleshoot WG connections that won't do a "handshake". (now that I know it should happpen going out from the CGNAT device)

          1st screen is the remote CGNAT device status
          2nd is the one with public IP

          I can send screenshots of Rules or anything just to get me past the 15 to 20 hrs I've spent on this.
          As you might can see -- I have been succesful in setting up WG connections before - both site to site and client to server

          Image 9-24-25 at 9.10 AM.jpeg Image 9-24-25 at 9.14 AM.jpeg

          1 Reply Last reply Reply Quote 0
          • stephenw10S Online
            stephenw10 Netgate Administrator
            last edited by

            Are you now able to ping from the client to the server outside the tunnel?

            I would check the states at both ends and filter by :51825. Make sure you're seeing WG opening states at both sides. And that they have two way traffic on them.

            A 2 Replies Last reply Reply Quote 0
            • A Offline
              ahole4sure @stephenw10
              last edited by ahole4sure

              @stephenw10

              Going crazy here
              I , TBH, am not sure whether I have been able to ping my public IP in the past or not. But I made sure I had created a WAN rule for allowing ping.
              I am not able to ping from my laptop using another internet source.
              I am not able to ping from the "client" pfsense box that is behind CGNAT

              As far as the States - I sent screen shots form the running site to site on port 51821
              AND I ssent screenshots from the non working connection with the client behind CGNAT 51825

              Looks there is some partial traffic but not 2 -way traffic!

              Image 9-24-25 at 9.10 AM.jpeg Image 9-24-25 at 9.14 AM.jpeg Image 9-24-25 at 12.15 PM.jpeg

              Image 9-24-25 at 12.16 PM.jpeg Image 9-24-25 at 12.21 PM.jpeg Image 9-24-25 at 12.23 PM.jpeg

              NOT SURE about the ping thing -- I have seemingly enabled ping to pass but I can't seem to ping my firewall from any device or any internet source BUT I have running services that are easily accesible from outside - that are coming in via https and haproxy

              S 1 Reply Last reply Reply Quote 0
              • S Offline
                SteveITS Galactic Empire @ahole4sure
                last edited by

                @ahole4sure ICMP to the public WAN IP from "any"/Internet would be allowed on the WAN interface which doesn't have that rule in your screenshot (may not be the right router).

                ICMP to the public WAN IP from LAN would be a rule on the LAN interface, though that has a default allow all rule.

                ICMP from within the VPN would be a rule on the Wireguard interface.

                ICMP/ping is not required for other services to work.

                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                Upvote 👍 helpful posts!

                1 Reply Last reply Reply Quote 0
                • A Offline
                  ahole4sure @stephenw10
                  last edited by

                  @stephenw10

                  Ok so some weird info --

                  I continued to not be able to ping - even with the rule (I think the screenshot you were referring to was my other router that I had not made that rule yet)
                  That made no sense -- so

                  I just temporarily disabled packet filtering all together -- result

                  1. I was then able to ping my main router
                  2. the previously "non-connecting" tunnel from the router behind CGNAT made the connection

                  I then renabled packet filtering

                  • became unable to ping my main router - depspite rule being in place
                  • the WG tunnel remained connected!

                  Seems like whatever is responsible for my "firewall" is not working correctly. I had rebooted last night and that didn't cause the incoming from CGNAT 51825 traffic to start -- but disabling the filtering did
                  ?? - any suggestionsImage 9-24-25 at 3.27 PM.jpeg Image 9-24-25 at 3.26 PM.jpeg Image 9-24-25 at 3.17 PM.jpeg Image 9-24-25 at 12.32 PM.jpeg
                  PS -- this pfsense install was from a complicated rough reinstall because the interface names were different -- the backup was hard to use ( that restore was a few months ago)

                  S 1 Reply Last reply Reply Quote 0
                  • S Offline
                    SteveITS Galactic Empire @ahole4sure
                    last edited by

                    @ahole4sure What are the 42 alerts at the top? ;)

                    The 0/0 in the Status column means no matching connections at least since counting started.

                    Try a Diagnostics>Filter Reload.

                    https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#new-rules-are-not-applied

                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                    Upvote 👍 helpful posts!

                    A 1 Reply Last reply Reply Quote 1
                    • A Offline
                      ahole4sure @SteveITS
                      last edited by ahole4sure

                      @SteveITS

                      I'll try the filer reload thing
                      Thanks

                      The alerts are an error that kept coming up after I restored a backup - with some mismatched interface assignments - etc

                      Do you have any suggestions on how to get rid of the error?
                      Can I get rid of the issue at an ssh level ??

                      If I recall right it is a rule on an interface or network that doesn't even exist and is not shown in the GUIImage 9-24-25 at 6.05 PM.jpeg

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S Online
                        stephenw10 Netgate Administrator
                        last edited by

                        The tailscale interface should not be assigned.

                        A 1 Reply Last reply Reply Quote 0
                        • A Offline
                          ahole4sure @stephenw10
                          last edited by

                          @stephenw10

                          While you guys are following this thread
                          Off topic
                          But an alternative for me to keep working on my new setup — can you guide me on how I could connect the WAN port on my second pfsense device to my existing LAN so that I at least have better internet but get to stay in my “new” and separate network
                          When I connect the wan (set on dhcp) port to a switch connected to my first pfsense lan I am not able to get internet
                          Is there something special that needs to be done to access internet from the second network and pfsense device?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S Online
                            stephenw10 Netgate Administrator
                            last edited by

                            Could be a subnet conflict if they both have the same LAN subnet. That will be an issue when you try to tunnel traffic between them also if so. Change the LAN subnet on the new device to something unused.

                            Otherwise nothing special should be required there. The default WAN setup as DHCP should work fine behind another pfSense install.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.