• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

IPSec outbound traffic being blocked on IPSec interface

2.4 Development Snapshots
11
29
10.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Y
    ysdtkhr
    last edited by Jan 25, 2017, 7:48 AM

    Steve

    I'm using on NAT-T

    The WAN interface is behind NAT

    Written by jimp
    –---
    Add some very forgiving floating rules outbound on enc0 that allow any TCP flags and use sloppy state.

    Registering floating while looking at errors that occur every time you communicate, such as SMB and RDP, was hard work

    After enabling System / Advanced / Firewall & NAT / Disable Firewall, VPN communication was done without registering a floating

    It is possible because the WAN interface is behind NAT

    ysdtkhr

    1 Reply Last reply Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by Feb 5, 2017, 12:19 PM

      Yes, this does seem to be caused by or a symptom of the WAN being behind NAT.

      Progress on this will be reported on the bug: https://redmine.pfsense.org/issues/7015

      Steve

      1 Reply Last reply Reply Quote 0
      • W
        w0w
        last edited by Mar 4, 2017, 8:04 PM

        Looks like it fixed on latest snapshot.

        1 Reply Last reply Reply Quote 0
        • S
          stephenw10 Netgate Administrator
          last edited by Mar 5, 2017, 1:36 PM

          Great, thanks for the feedback.  :)

          Steve

          1 Reply Last reply Reply Quote 0
          • M
            megapearl
            last edited by Mar 5, 2017, 5:30 PM

            Working for me too!  :D

            1 Reply Last reply Reply Quote 0
            • D
              dem
              last edited by Apr 4, 2017, 2:26 PM

              I'm seeing symptoms like those described in this thread with IPv6. I'm trying to use an IPv6 Phase 2 in an IPv4 Phase 1 which uses NAT-T. I'm trying to send all incoming LAN traffic out through a remote VPN server.

              The IPv6 states appear to be backwards and all outgoing IPv6 is being blocked by:

              block in log inet6 all tracker 1000000105 label "Default deny rule IPv6"
              

              Creating a "sloppy floating rule" like the one mentioned earlier in this thread helps somewhat, but traffic still stalls, especially if I take any action that reloads the filters.

              I'm new to IPsec so it could be user error, but IPv4 seems to be working fine over the same Phase 1 without any added rules.

              1 Reply Last reply Reply Quote 0
              • J
                jimp Rebel Alliance Developer Netgate
                last edited by Apr 4, 2017, 2:30 PM

                @Dave:

                I'm seeing symptoms like those described in this thread with IPv6. I'm trying to use an IPv6 Phase 2 in an IPv4 Phase 1 which uses NAT-T. I'm trying to send all incoming LAN traffic out through a remote VPN server.

                Are you running 2.4? If not, try 2.4. If you are on 2.4, make sure you are on a current snapshot.

                If this is still a problem on a current 2.4 snapshot, comment on https://redmine.pfsense.org/issues/7015 with the details of your IPsec setup, firewall rules, and state table contents.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • D
                  dem
                  last edited by Apr 4, 2017, 2:36 PM

                  I'm running 2.4.0.b.20170403.0902.

                  I'll gather some details for that bug.

                  Thanks.

                  1 Reply Last reply Reply Quote 0
                  • M
                    mic.dal
                    last edited by Oct 18, 2017, 5:47 PM

                    Hello,
                    I have the same problem, I have 3 PFsense (A, B, C) in IPSEC VPN site-to-site.
                    Until version 2.3.6 everything worked perfectly. Just after upgrading to Version 4, Site C only passes PING but no TCP / UDP service.

                    The strange thing is that A and B work perfectly.

                    I reset the configuration of C (2 HP DL160Gen9 Server in HA) and tried to create a local VPN between C1 and C2 with version 2.3.6 and it works perfectly. Just updating to version 2.4 works only on PING.
                    I think it is a bug that only affects some hardware with version 2.4.

                    1 Reply Last reply Reply Quote 0
                    • U
                      usern876
                      last edited by Oct 20, 2017, 12:00 AM

                      Hi,
                        Not sure if it's related, but I saw similar state weirdness. IKEv2 mobile clients, with clients behind nat, but server with public IP. IPv4 only.
                        In my case the trigger seemed to be multiple clients with the same credentials, when I had peer identifier set to any, and configure unique IDs = yes. I saw similar unidirectional TCP issues as well.

                      1 Reply Last reply Reply Quote 0
                      • I
                        ierdelyi @w0203j
                        last edited by Sep 24, 2018, 9:27 AM

                        @w0203j

                        Hello,
                        Can you attache a screenshot? I cannot set it properly.

                        Thanks,

                        1 Reply Last reply Reply Quote 0
                        • I
                          ierdelyi @w0w
                          last edited by Sep 24, 2018, 10:50 AM

                          @w0w

                          Hello,
                          Could you please detail this point?
                          I tried to set this floating rule on ipsec interface without success.

                          The ping is OK between the two subnet, but the inbound TCP traffic was blocked by IPSec interface default IPv4 rule.

                          Ver: 2.4.2

                          Thanks,
                          Istvan

                          I 1 Reply Last reply Sep 24, 2018, 1:51 PM Reply Quote 0
                          • I
                            ierdelyi @ierdelyi
                            last edited by Sep 24, 2018, 1:51 PM

                            @ierdelyi

                            I found the solution:

                            Add an allow all 'floating' rule, with interface set to the GRE interface, and direction set to any. Also, note that both the rule on the GRE interface, and the floating rule have advanced option 'State Type' set to NONE

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.