Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Policy routing on established connection

    Scheduled Pinned Locked Moved General pfSense Questions
    11 Posts 5 Posters 4.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      Willy
      last edited by

      Is there any info missing that prevents anyone from providing a solution? Or is the behavior as designed?

      1 Reply Last reply Reply Quote 0
      • B
        Boinc
        last edited by

        Did you solve this?

        I have the same problem. Oitgoing policy route works just fine, but when it is an incoming connection the reply is not following the policy route but the default route.

        Please advise.

        1 Reply Last reply Reply Quote 0
        • C
          cmb
          last edited by

          reply-to is not used on OpenVPN connections unless the tun interface they're using is assigned as an OPT, then it should be. The incoming traffic will follow the routing table without that reply-to.

          1 Reply Last reply Reply Quote 0
          • W
            Willy
            last edited by

            The openvpn connection is not created on the pfSense server but on a separate server located in the DMZ subnet of the pfSense server. As far as the pfSense server is concerned it's "just" another gateway.

            Sorry for not being clear about this in the opening post.

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by

              Oh, then you'll need to define that other device as a gateway and specify it on the interface that faces that system. You'll have to be careful about how that impacts the automatically generated outbound NAT rules (unless you're using manual outbound NAT) as it will then treat that interface the same as an Internet connection.

              1 Reply Last reply Reply Quote 0
              • W
                Willy
                last edited by

                OK, so when I set the gateway for that interface to the gateway I have configured for the OpenVPN server then the policy rules will work on return-connections as well?

                The MPLS line is also not configured as an internet connection (no gateway set in the interface). Would it be better to do so?

                1 Reply Last reply Reply Quote 0
                • B
                  Boinc
                  last edited by

                  Does it work Willy?

                  1 Reply Last reply Reply Quote 0
                  • W
                    Willy
                    last edited by

                    No, the problem persists.

                    In my opinion, if a connection comes in via gateway-X it should go back via that gateway, it shouldn't go back via gateway-Y. But that is exactly what pfSense does. Instead of going back via the same gateway it seems to go back via the routes defined in the routing table.

                    I'd like this to be considered as a bug.

                    I'm happy to provide you with logs, configurations settings or anything else when needed to track this down.

                    Edit: currently running 2.0-RC3 (amd64) built on Fri Aug 12 14:47:46 EDT 2011.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      Depending on how you have that setup, it may not be possible for pfSense to know that the connection came from that gateway, so what you are asking for may be impossible. It isn't a bug really, but a "feature" of how you designed your network.

                      Asymmetric routing can cause all kinds of fun things like this to happen.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • E
                        eytanes
                        last edited by

                        Hi,
                        I've encountered the same issue. I'm trying to get all site-to-site site vpn traffic (the return traffic as well) to route via an interface group (two simultaneous tunnels) and not the routing table.
                        I assigned each tunnel an interface and set a rule on the lan to use the gateway group for all traffic destined to the opposing site.
                        The problem is that if one tunnel goes down, and its the one in the routing table, the return traffic gets lost.
                        Any pointers on how I can get it working?

                        Thanks,
                        E

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.