Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    T-Mobile WIFI Calling

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 7 Posters 8.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      madas
      last edited by

      Here is all states to/from TMOBILE (including the port 500 session) and the drops from TMOBILE on a bunch of random ports

      My LAN rules are basically just allow everything to everywhere.  I don't block anything outbound.

      I notice the static port rule for port 500 on the outbound NAT…could it be related to this? - I removed the STATIC port for 500 and it didn't help.

      I'm not sure if its something with PFSense 2.2.2 or VMWARE

      WIFI2.PNG
      WIFI2.PNG_thumb
      WIFI3.PNG
      WIFI3.PNG_thumb

      1 Reply Last reply Reply Quote 0
      • A
        almabes
        last edited by

        I have an AT&T micro cell on a customer network that does the same sort of thing.  It establishes a IKE/IPSec connection back to the Death Star and offers 3G cell service.

        I didn't mess with any of the NAT settings to get that thing to work.  Are you set to Automatic outbound NAT rule generation
        (IPsec passthrough included)

        Maybe if you were to post a picture of your Outbound NAT screen in the webConfigurator someone can help.

        1 Reply Last reply Reply Quote 0
        • M
          madas
          last edited by

          Ah yes - the old microcells.

          Here is out outbound NAT rules.  They are unchanged from the default way that they come out of the box.

          OutboundNAT.PNG
          OutboundNAT.PNG_thumb

          1 Reply Last reply Reply Quote 0
          • M
            madas
            last edited by

            System–>Advanced>Firewall/NAT

            This was ticked "Disables the PF scrubbing option which can sometimes interfere with NFS and PPTP traffic. " - I had to untick it and everything now works

            I've wasted about 8 hours on this, and 2 cases of corona!...hopefully this helps someone else!

            Wish I remember why I had that on in the first place.

            1 Reply Last reply Reply Quote 0
            • A
              almabes
              last edited by

              Cool.  Glad you found it.  I would have never guessed that would be the answer.

              1 Reply Last reply Reply Quote 0
              • M
                madas
                last edited by

                me either.  It doesn't sound like it has anything to do with it.

                I built a new firewall and it worked.  Then I loaded my config file sections one by one until it broke.  Then did a file compare on the good config and the bad config and then toggled the options one-by-one….

                phewwww

                1 Reply Last reply Reply Quote 0
                • E
                  Elusive
                  last edited by

                  I recently had to debug getting pfSense working with both t-mobile wifi calling and an at&t microcell.
                  In addition to making sure all the right IPSEC ports are allowed on the way in on the WAN (500,4500), I also had to make sure bogon networks are not blocked on the WAN interface.
                  My understanding of this is that both AT&T and t-mobile break standards and use bogon IPs on their networks, which the firewall drops.

                  1 Reply Last reply Reply Quote 0
                  • C
                    cmb
                    last edited by

                    @Elusive:

                    I recently had to debug getting pfSense working with both t-mobile wifi calling and an at&t microcell.
                    In addition to making sure all the right IPSEC ports are allowed on the way in on the WAN (500,4500), I also had to make sure bogon networks are not blocked on the WAN interface.
                    My understanding of this is that both AT&T and t-mobile break standards and use bogon IPs on their networks, which the firewall drops.

                    Only within the IPsec connection, not outside of it. Which is fine. Something other than disabling block bogon fixed that, because both of those are strictly outbound traffic, no remotely-initiated traffic that could even match the block bogon. They also wouldn't be able to route bogon source IPs across the Internet in any useful manner. I'm guessing you probably made some NAT changes to fix it, but didn't clear states afterwards, and the states timed out or the device reconnected in the mean time which is what made it start working.

                    1 Reply Last reply Reply Quote 0
                    • E
                      Elusive
                      last edited by

                      Good points. I do have settings to do static outbount NAT on the at&t and t-mobile devices. I will try to re-enable bogon blocking on the WAN and see what happens. Thanks!

                      1 Reply Last reply Reply Quote 0
                      • DudleydoggD
                        Dudleydogg
                        last edited by

                        This was on T-Mobile WIFI Calling but this Fixed my AT&T issue also.

                        Thanks Guys

                        1 Reply Last reply Reply Quote 0
                        • lohphatL
                          lohphat
                          last edited by

                          T-Mobile's incarnation of wifi calling is based on the GAN/UMA standard. IPsec is used to secure the connection. More info in the following links for reference:

                          https://en.wikipedia.org/wiki/Generic_Access_Network

                          and

                          https://www.cisco.com/cdc_content_elements/flash/mobile_sols/partners_site/pdfs/partners/kineto/GAN_UMA_TDM.pdf

                          and

                          https://support.onsip.com/hc/en-us/articles/204029430-PFSense-Firewall-Settings-for-VoIP

                          SG-3100 24.11-RELEASE (arm) | Avahi (2.2_6) | ntopng (5.6.0_1) | openvpn-client-export (1.9.5) | pfBlockerNG-devel (3.2.1_20) | System_Patches (2.2.20_5)

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Locking this thread, it's over 4 years old!

                            If you have new information on a subject please start a new thread.

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.