Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Punching a hole for 1194 (OpenVPN) with floating rules causes VPN packet errors

    Scheduled Pinned Locked Moved OpenVPN
    12 Posts 3 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Why are you setting gateways there? Don't do that.

      Floating rule screen shots are pretty worthless without knowing what interface and direction the rules are on.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • M
        m00011
        last edited by

        That was just a test to see if it made a difference.  It does not, no matter what I do, I still get the same errors over and over.  Any other ideas?

        Thanks!

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Why are you trying to block traffic both in and out of an interface… Seems pointless.. If you allow it in, by the very nature of the state it will be allowed back out.

          Why are you using floating??  How many interfaces/vlans do you have?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • M
            m00011
            last edited by

            @johnpoz:

            Why are you trying to block traffic both in and out of an interface… Seems pointless.. If you allow it in, by the very nature of the state it will be allowed back out.

            Why are you using floating??  How many interfaces/vlans do you have?

            Maybe the inbound/outbound specification is redundant, but nevertheless, I still need to figure out why it is causing packet errors.

            As for floating rule usage - I have to put it here because floating rules take precedence.  If I don't allow 1194 before blocking all other traffic, the VPN traffic doesn't even make it in the door.  And I have floating rules in the first place b/c it was the only way to implement a kill switch.

            And interfaces - 3 - WAN/LAN/PIA virtual interface

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              "I have to put it here because floating rules take precedence."

              huh??  precedence over what??  Why would you just not put on your wan interface to allow 1194..  You have 1 lan.. Your kill switch as you call it is just remove the default allow and put in your allow to go out the vpn gateway you setup..

              There really should be nothing in your floating tab, and have ZERO reason to block on outbound on an interface..

              You have your 1 rule on lan for going out your vpn, you have 1 rule on your wan to allow your 1194 inbound = done!!

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • M
                m00011
                last edited by

                @johnpoz:

                huh??  precedence over what??  Why would you just not put on your wan interface to allow 1194..  You have 1 lan..

                Per the pfsense docs on floating rules : "Floating Rules are parsed before rules on other interfaces. Thus, if a packet matches a floating rule and the Quick option is active on that rule, pfSense will not attempt to filter that packet against any rule on any other group or interface tab"

                Hence my statement.  And of course I want to block outbound traffic on an interface, how else would I prevent my traffic from accidentally going out over anything besides the PIA provider?

                All of this conjecture is still completely orthogonal to the problem at hand - why are rules causing TLS/packet issues??

                1 Reply Last reply Reply Quote 0
                • M
                  m00011
                  last edited by

                  Ok, so I get the feeling that the kill switch functionality is being misunderstood here.  The problem is that if you specify a rule that forces all traffic over the VPN interface, and that interface (VPN) goes down, pfSense will automatically find a new route despite explicit instructions to use the VPN.  The pfSense documentation does say this:
                  "By default, when a rule has a specific gateway set and this gateway is down, a rule is created and traffic is sent to the default gateway."  So the suggestion to simply create rules on the WAN is insufficient if you want to make sure that there are no traffic leaks.

                  The good news is there is a way to make the firewall rules do what you intend ==> In System: Advanced: Miscellaneous, check Skip rules when gateway is down. That provides backup protection against leaks to WAN if the VPN connection goes down.  That let me get rid of the floating rule kill switch.

                  The bad news is that no explanation was ever given for why the floating rules were causing VPN packet errors, but hey, I'll take what I can get.  Maybe someone else can chime in on that front.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    "And of course I want to block outbound traffic on an interface, how else would I prevent my traffic from accidentally going out over anything besides the PIA provider?"

                    You clearly don't understand how the rules are evaluated.

                    Rules are evaluated top down, first rule to trigger wins - no other rules are evaluated.  On the interface that traffic enters pfsense on!!

                    You have a rule that sends data out your VPN, an allow statement on your lan..  If the vpn is down.. What happens??  Nothing - there is no other allow rule… So traffic killed.  Why would you think you need this on the floating tab??  Just 1 rule on your lan is all you need!!

                    Then to allow your vpn users in, 1 rule on your WAN.. This is where the traffic first enters pfsense.  So here is rule on interface that clients get out on.. Ie lan..  So traffic hits pfsense on interface - any any allowed out the VPN!!  if vpn is down... What allows the traffic??  Nothing - so killed!!

                    There is no other allow rule, the rule says go out the vpn!  If can not go out the vpn traffic is stopped there with the default deny.

                    vpnonly.png
                    vpnonly.png_thumb

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Except that there is a feature that eliminates the gateway from rules if the gateway is down.

                      Much better than floating rules, in my opinion, is using the tag/tagged feature.

                      Search this forum for "NO_WAN_EGRESS"

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        "Except that there is a feature that eliminates the gateway from rules if the gateway is down."

                        So?  There is no rule under it to allow anything.. If he had the default allow rule under it then sure that could be an issue.. But if your forcing everything out the vpn, then an any rule under it is pointless..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          The point is if that feature is not disabled and the gateway is detected as down, the rule still exists but without the policy routing applied so all that VPN traffic goes to the routing table and out WAN in-the-clear. This is the default behavior.

                          By default, when a rule has a gateway specified and this gateway is down, the rule is created omitting the gateway. This option overrides that behavior by omitting the entire rule instead.

                          tagging/tagged is the best way to ensure traffic that should go over the VPN does not go out WAN.

                          1. If it should go over the VPN tag it.
                          2. Do not let anything out WAN with that tag.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.