Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN behind the router

    Scheduled Pinned Locked Moved OpenVPN
    11 Posts 4 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann
      last edited by

      Please, post the WAN rule for OpenVPN.

      1 Reply Last reply Reply Quote 0
      • N
        nikkopegmail.com
        last edited by

        Since this is LAB env. I have opened basically everything.
        And as mentioned, ssh works. Wondering is this somehow UDP related, so could there be some general UDP drop from WAN.

        br, pete

        1 Reply Last reply Reply Quote 0
        • chpalmerC
          chpalmer
          last edited by

          Do you have "Block private networks and loopback addresses" unchecked on your WAN interface?
          OpenVPN instance(s) server or client on your Pfsense box?

          Triggering snowflakes one by one..
          Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            @chpalmer:

            Do you have "Block private networks and loopback addresses" unchecked on your WAN interface?
            OpenVPN instance(s) server or client on your Pfsense box?

            That won't matter since the source address is presumably public: 85.76.83.183

            Unless that is actually a bogon. But in that case it would be blocked by the bogon rule, not the default deny.

            OP is obviously not passing the OpenVPN traffic. As was already asked, post the OpenVPN rule on that WAN interface.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • chpalmerC
              chpalmer
              last edited by

              @Derelict:

              That won't matter since the source address is presumably public: 85.76.83.183

              Not according to his graph..

              INTERNET <> FIREWALL <> (192.168.1.0/24) <> PFSENSE <> ANOTHER LAN(s)
              Maybe I read wrong..??

              Triggering snowflakes one by one..
              Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

              1 Reply Last reply Reply Quote 0
              • N
                nikkopegmail.com
                last edited by

                Derelict is right, in the firts post the src address is 85.76.83.183 (from Finnish mobile ISP pool) - and my mistake, the original post was innacurate.

                So the pfsense sees the original public src.

                However the "Block private networks and loopback addresses" is unchecked.

                Is there a way to see the ruleset from cli to post it here.

                pfctl -sr does not return anything.

                / br, pete

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  @chpalmer:

                  @Derelict:

                  That won't matter since the source address is presumably public: 85.76.83.183

                  Not according to his graph..

                  INTERNET <> FIREWALL <> (192.168.1.0/24) <> PFSENSE <> ANOTHER LAN(s)
                  Maybe I read wrong..??

                  May 18 11:28:08 pfSense filterlog: 5,,,1000000103,xn0,match,block,in,4,0x0,,60,9389,0,DF,17,udp,70,85.76.83.183,192.168.1.10,43232,1194,50

                  That is the source address that was blocked. It is not RFC1918. It was blocked by the default deny rule, not the RFC1918 block rule.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    @nikkope@gmail.com:

                    Derelict is right, in the firts post the src address is 85.76.83.183 (from Finnish mobile ISP pool) - and my mistake, the original post was innacurate.

                    So the pfsense sees the original public src.

                    However the "Block private networks and loopback addresses" is unchecked.

                    Is there a way to see the ruleset from cli to post it here.

                    pfctl -sr does not return anything.

                    / br, pete

                    pfctl -sr should definitely show something. Is your ruleset even loading? Are there any alerts in the upper-right of the GUI?

                    What does this say?

                    pfctl -nf /tmp/rules.debug

                    What is in /tmp/rules.debug?

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • N
                      nikkopegmail.com
                      last edited by

                      I did found the problem.

                      Thank You all.

                      The problem was that I had I fw rule that prevented the ruleset to load.

                      Good point from Derelict, pfctl should definitely show the ruleset.

                      The problematic row was:

                      There were error(s) loading the rules: /tmp/rules.debug:140: unknown protocol udp4 - The line in question reads [140]: pass  in  quick  on $WAN reply-to ( xn0 192.168.1.1 ) inet proto udp4  from any to 192.168.1.10 tracker 1526637072 keep state  label "USER_RULE: OpenVPN  wizard"

                      I did found this by reloading the rules and checking the reload status. After changing that and reloading everything works as should.

                      Thanks again for all !

                      / br, pete

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        That is from an issue with the openvpn wizard. Already fixed in 2.4.3_1 and 2.3.5_2

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.