Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PPTP - Allowing incoming connections from both WAN & WAN2

    Scheduled Pinned Locked Moved Routing and Multi WAN
    11 Posts 4 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cmb
      last edited by

      add rules to allow TCP 1723 and GRE on WAN2.

      1 Reply Last reply Reply Quote 0
      • K
        knjers
        last edited by

        I was under the impression that incoming PPTP works only over one WAN connection. The secondary WAN (OPTx) will not correctly route incoming PPTP.

        I tried to get this to work on 1.2-RC2 but did not succeed.
        Windows VPN never got out of Verifying username and password.

        It did work when I connected a laptop directly to the subnet between the pfSense and external DSL modem/router. But, when connecting through the Internet it would hang.
        The primary WAN worked from day one. My conclusion was that, after initialising hrough TCP port 1723, the GRE tunnel was routed out of the primary WAN, and not through the secondary.

        If it was a bug, then it obviously is time to upgrade.

        1 Reply Last reply Reply Quote 0
        • M
          martinw
          last edited by

          @knjers:

          I tried to get this to work on 1.2-RC2 but did not succeed.
          Windows VPN never got out of Verifying username and password.

          I've added these rules

          TCP/UDP  *  *  *  1723 (PPTP)  *      allow vpn

          GRE * * * * *   allow vpn

          and I'm getting windows hanging on verifying username & passwork (error 619)

          Martinw

          1 Reply Last reply Reply Quote 0
          • K
            knjers
            last edited by

            I am almost sure that it is a bug. There are some posts on the forum about PPTP only working through the primary WAN.

            The problem is, in my opinion, that the GRE tunnel always goes to the default route, since it originates from the router. The secondary (or tertiary)WAN are governed by policy routing, and that applies only to traffic through the router, not to traffic originating from the router.

            I am not sure if this could be fixed through the shell.  My knowledge of GRE protocol is very limited. I just know how to click on icons.

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by

              The reply-to automatically added to WAN rules should route the traffic properly if you're using 1.2.1 or newer.  I'll try it at some point and make sure.

              1 Reply Last reply Reply Quote 0
              • N
                newfirewallman
                last edited by

                What do you mean by "The reply-to automatically added to WAN rules "

                1 Reply Last reply Reply Quote 0
                • C
                  cmb
                  last edited by

                  @newfirewallman:

                  What do you mean by "The reply-to automatically added to WAN rules "

                  read up on pf.

                  1 Reply Last reply Reply Quote 0
                  • N
                    newfirewallman
                    last edited by

                    Thanks for the helpful answer CMB… Why post anything if it isn't going to help. "Read UP on PF" Ok i've searched the entire forum and didn't get a hit except for the post we are in. And i have been using PFsense everywhere. Home, office, schools, muliwan, point to point VPN's. About every feature of it, yet not sure what your talking about by "The reply-to automatically added to WAN rules"

                    Maybe it is something simple that when you explain or give someone some helpful information like a screenshot i might go oh yeah duh, but for now because you didn't help anyone with your response why do you go make it work and tell us all so we can RESPECT you, till then go lay infront of a bus.

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      It is helpful. OpenBSD pf, not pfSense.  It's covered in their documentation. http://www.openbsd.org/cgi-bin/man.cgi?query=pf.conf&apropos=0&sektion=0&manpath=OpenBSD+Current&arch=i386&format=html

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        @newfirewallman:

                        till then go lay infront of a bus.

                        Wow, classiest post of the week.  Watch out for your karma.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.