Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Strange Routing Issue

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 4.8k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S Online
      stephenw10 Netgate Administrator
      last edited by

      It's still site to site it's just that the tunnel can only be established from the side behind CGNAT. But, yes, once the tunnel is established connections can be opened across it both ways.

      A 1 Reply Last reply Reply Quote 0
      • A Offline
        ahole4sure @stephenw10
        last edited by

        @stephenw10

        Thanks as always for your help!!!!

        I am back to the setup again - and still trying to get past the same issue that I had initially (whhere I can't seem to get a hanshake)

        I have a screenshot of the status page of the device that is behind CGNAT that should be initiating the tunnel

        I relaize that there are many things like the WAN rule allowing 51825 in , etc
        But is there a good way to troubleshoot WG connections that won't do a "handshake". (now that I know it should happpen going out from the CGNAT device)

        1st screen is the remote CGNAT device status
        2nd is the one with public IP

        I can send screenshots of Rules or anything just to get me past the 15 to 20 hrs I've spent on this.
        As you might can see -- I have been succesful in setting up WG connections before - both site to site and client to server

        Image 9-24-25 at 9.10 AM.jpeg Image 9-24-25 at 9.14 AM.jpeg

        1 Reply Last reply Reply Quote 0
        • stephenw10S Online
          stephenw10 Netgate Administrator
          last edited by

          Are you now able to ping from the client to the server outside the tunnel?

          I would check the states at both ends and filter by :51825. Make sure you're seeing WG opening states at both sides. And that they have two way traffic on them.

          A 2 Replies Last reply Reply Quote 0
          • A Offline
            ahole4sure @stephenw10
            last edited by ahole4sure

            @stephenw10

            Going crazy here
            I , TBH, am not sure whether I have been able to ping my public IP in the past or not. But I made sure I had created a WAN rule for allowing ping.
            I am not able to ping from my laptop using another internet source.
            I am not able to ping from the "client" pfsense box that is behind CGNAT

            As far as the States - I sent screen shots form the running site to site on port 51821
            AND I ssent screenshots from the non working connection with the client behind CGNAT 51825

            Looks there is some partial traffic but not 2 -way traffic!

            Image 9-24-25 at 9.10 AM.jpeg Image 9-24-25 at 9.14 AM.jpeg Image 9-24-25 at 12.15 PM.jpeg

            Image 9-24-25 at 12.16 PM.jpeg Image 9-24-25 at 12.21 PM.jpeg Image 9-24-25 at 12.23 PM.jpeg

            NOT SURE about the ping thing -- I have seemingly enabled ping to pass but I can't seem to ping my firewall from any device or any internet source BUT I have running services that are easily accesible from outside - that are coming in via https and haproxy

            S 1 Reply Last reply Reply Quote 0
            • S Offline
              SteveITS Galactic Empire @ahole4sure
              last edited by

              @ahole4sure ICMP to the public WAN IP from "any"/Internet would be allowed on the WAN interface which doesn't have that rule in your screenshot (may not be the right router).

              ICMP to the public WAN IP from LAN would be a rule on the LAN interface, though that has a default allow all rule.

              ICMP from within the VPN would be a rule on the Wireguard interface.

              ICMP/ping is not required for other services to work.

              Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
              Upvote 👍 helpful posts!

              1 Reply Last reply Reply Quote 0
              • A Offline
                ahole4sure @stephenw10
                last edited by

                @stephenw10

                Ok so some weird info --

                I continued to not be able to ping - even with the rule (I think the screenshot you were referring to was my other router that I had not made that rule yet)
                That made no sense -- so

                I just temporarily disabled packet filtering all together -- result

                1. I was then able to ping my main router
                2. the previously "non-connecting" tunnel from the router behind CGNAT made the connection

                I then renabled packet filtering

                • became unable to ping my main router - depspite rule being in place
                • the WG tunnel remained connected!

                Seems like whatever is responsible for my "firewall" is not working correctly. I had rebooted last night and that didn't cause the incoming from CGNAT 51825 traffic to start -- but disabling the filtering did
                ?? - any suggestionsImage 9-24-25 at 3.27 PM.jpeg Image 9-24-25 at 3.26 PM.jpeg Image 9-24-25 at 3.17 PM.jpeg Image 9-24-25 at 12.32 PM.jpeg
                PS -- this pfsense install was from a complicated rough reinstall because the interface names were different -- the backup was hard to use ( that restore was a few months ago)

                S 1 Reply Last reply Reply Quote 0
                • S Offline
                  SteveITS Galactic Empire @ahole4sure
                  last edited by

                  @ahole4sure What are the 42 alerts at the top? ;)

                  The 0/0 in the Status column means no matching connections at least since counting started.

                  Try a Diagnostics>Filter Reload.

                  https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#new-rules-are-not-applied

                  Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                  Upvote 👍 helpful posts!

                  A 1 Reply Last reply Reply Quote 1
                  • A Offline
                    ahole4sure @SteveITS
                    last edited by ahole4sure

                    @SteveITS

                    I'll try the filer reload thing
                    Thanks

                    The alerts are an error that kept coming up after I restored a backup - with some mismatched interface assignments - etc

                    Do you have any suggestions on how to get rid of the error?
                    Can I get rid of the issue at an ssh level ??

                    If I recall right it is a rule on an interface or network that doesn't even exist and is not shown in the GUIImage 9-24-25 at 6.05 PM.jpeg

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Online
                      stephenw10 Netgate Administrator
                      last edited by

                      The tailscale interface should not be assigned.

                      A 1 Reply Last reply Reply Quote 0
                      • A Offline
                        ahole4sure @stephenw10
                        last edited by

                        @stephenw10

                        While you guys are following this thread
                        Off topic
                        But an alternative for me to keep working on my new setup — can you guide me on how I could connect the WAN port on my second pfsense device to my existing LAN so that I at least have better internet but get to stay in my “new” and separate network
                        When I connect the wan (set on dhcp) port to a switch connected to my first pfsense lan I am not able to get internet
                        Is there something special that needs to be done to access internet from the second network and pfsense device?

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S Online
                          stephenw10 Netgate Administrator
                          last edited by

                          Could be a subnet conflict if they both have the same LAN subnet. That will be an issue when you try to tunnel traffic between them also if so. Change the LAN subnet on the new device to something unused.

                          Otherwise nothing special should be required there. The default WAN setup as DHCP should work fine behind another pfSense install.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.