Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port Forwarding

    Scheduled Pinned Locked Moved OpenVPN
    19 Posts 4 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sweden_cool @Rico
      last edited by

      @rico

      Yes, there is little traffic from VPN provider that will go to my dc ++ and utorrent.

      I have looked at that clip, but does he open ports because I could not see it?

      Tell me where you want to see and I send pictures?

      1 Reply Last reply Reply Quote 0
      • RicoR
        Rico LAYER 8 Rebel Alliance
        last edited by

        From my memory he is not showing exactly how Port Forwarding from any VPN Provider works, but giving an idea how this stuff generally works (assign/configure VPN Interface, Firewall Rules, and so on).

        -Rico

        S 1 Reply Last reply Reply Quote 0
        • S
          sweden_cool @Rico
          last edited by

          @rico

          I have followed this https://www.reddit.com/r/PFSENSE/comments/6edsav/how_to_proper_partial_network_vpn_with_kill_switch/.

          1 Reply Last reply Reply Quote 0
          • V
            viragomann
            last edited by

            @sweden_cool said in Port Forwarding:

            Yes, there is little traffic from VPN provider that will go to my dc ++ and utorrent.

            If your VPN provider forwards the ports to you it should work with a port forwarding rule on the interface you've assigned to the vpn appropriate client instance.

            But I'm in doubt, you get these ports really forwarded. Just use packet capture from the pfSense Diagnostic menu on the OpenVPN interface group to check that out.

            S 1 Reply Last reply Reply Quote 0
            • S
              sweden_cool @viragomann
              last edited by

              @viragomann

              Got this when I tested this with port 60722.

              https://www.yougetsignal.com/tools/open-ports/

              16:43:50.836144 IP hidden.38.210.36996 > hidden.106.182.60722: tcp 0
              16:43:50.836197 IP hidden.38.210.8440 > hidden.106.166.60722: tcp 0
              16:43:55.057344 IP hidden.98.246.60232 > hidden.38.210.60722: tcp 0
              16:43:56.055547 IP hidden.98.246.60232 > hidden.38.210.60722: tcp 0
              16:43:56.062655 IP hidden.98.246.60236 > hidden.38.210.60722: tcp 0
              16:43:57.058936 IP hidden.98.246.60243 > hidden.38.210.60722: tcp 0
              16:43:57.059579 IP hidden.98.246.60236 > hidden.38.210.60722: tcp 0
              16:43:58.058874 IP hidden.98.246.60243 > hidden.38.210.60722: tcp 0
              
              1 Reply Last reply Reply Quote 0
              • V
                viragomann
                last edited by

                On the OpenVPN interface, not on WAN?
                Which devices to that IPs belong to? Hidden....

                Have your already assigned an interface to the vpn client instance and activated it?

                S 1 Reply Last reply Reply Quote 0
                • S
                  sweden_cool @viragomann
                  last edited by

                  @viragomann

                  Interface: OVPN_VPN

                  18:52:16.939183 IP 185.157.161.152.53234 > 10.128.38.210.60722: tcp 0
                  18:52:17.965667 IP 85.224.149.157.29710 > 10.128.38.210.60722: tcp 0
                  18:52:18.658740 IP 91.240.66.48.53899 > 10.128.38.210.60722: tcp 0
                  18:52:18.964428 IP 85.224.149.157.29710 > 10.128.38.210.60722: tcp 0
                  18:52:19.523353 IP 81.25.149.133.62243 > 10.128.38.210.60722: tcp 0
                  18:52:19.701724 IP 83.254.161.10.50540 > 10.128.38.210.60722: tcp 0
                  18:52:19.946048 IP 185.157.161.152.53234 > 10.128.38.210.60722: tcp 0
                  18:52:20.554269 IP 90.230.23.44.4481 > 10.128.38.210.60722: tcp 0
                  18:52:20.918101 IP 185.86.107.205.38543 > 10.128.38.210.60722: tcp 0
                  18:52:20.967947 IP 85.224.149.157.29710 > 10.128.38.210.60722: tcp 0
                  18:52:21.214450 IP 185.86.106.150.57721 > 10.128.38.210.60722: tcp 0
                  18:52:21.581429 IP 90.230.23.44.4481 > 10.128.38.210.60722: tcp 0
                  18:52:21.654341 IP 91.240.66.48.53899 > 10.128.38.210.60722: tcp 0
                  18:52:21.925520 IP 185.86.107.205.38543 > 10.128.38.210.60722: tcp 0
                  18:52:22.567468 IP 81.25.149.133.62300 > 10.128.38.210.60722: tcp 0
                  18:52:23.597319 IP 90.230.23.44.4481 > 10.128.38.210.60722: tcp 0
                  18:52:23.848450 IP 198.199.98.246.37355 > 10.128.38.210.60722: tcp 0
                  18:52:23.941114 IP 185.86.107.205.38543 > 10.128.38.210.60722: tcp 0
                  18:52:24.341094 IP 85.24.253.39.58219 > 10.128.38.210.60722: tcp 0
                  18:52:24.839786 IP 198.199.98.246.37357 > 10.128.38.210.60722: tcp 0
                  18:52:24.846481 IP 198.199.98.246.37355 > 10.128.38.210.60722: tcp 0
                  18:52:24.972598 IP 85.224.149.157.29710 > 10.128.38.210.60722: tcp 0
                  18:52:25.836596 IP 198.199.98.246.37357 > 10.128.38.210.60722: tcp 0
                  18:52:25.841382 IP 198.199.98.246.37360 > 10.128.38.210.60722: tcp 0
                  18:52:25.946941 IP 185.157.161.152.53234 > 10.128.38.210.60722: tcp 0
                  18:52:26.841404 IP 198.199.98.246.37360 > 10.128.38.210.60722: tcp 0
                  18:52:27.351544 IP 85.24.253.39.58219 > 10.128.38.210.60722: tcp 0
                  18:52:27.660667 IP 91.240.66.48.53899 > 10.128.38.210.60722: tcp 0
                  18:52:27.693316 IP 90.230.23.44.4481 > 10.128.38.210.60722: tcp 0
                  18:52:28.102717 IP 185.86.107.205.38543 > 10.128.38.210.60722: tcp 0
                  18:52:28.299994 IP 193.138.218.165.49558 > 10.128.38.210.60722: tcp 0
                  18:52:28.721840 IP 78.67.17.227.41246 > 10.128.38.210.60722: tcp 0
                  18:52:29.329428 IP 193.138.218.165.49558 > 10.128.38.210.60722: tcp 0
                  18:52:29.642628 IP 78.67.17.227.41246 > 10.128.38.210.60722: tcp 0
                  18:52:31.345281 IP 193.138.218.165.49558 > 10.128.38.210.60722: tcp 0
                  

                  0_1538153343021_interface.PNG
                  0_1538153388607_open_vpn.PNG

                  1 Reply Last reply Reply Quote 0
                  • V
                    viragomann
                    last edited by

                    10.128.38.210 is your virtual vpn address, I guess?
                    So you should use this one as destination in the port forwarding rule.

                    However, the problem which the screenshot shows is the check at "Block private networks..." in the vpn interface settings. Since your clients IP (here obv. 10.128.38.210) is a private one, you must remove that check, otherwise all incoming connections get blocked.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      sweden_cool @viragomann
                      last edited by

                      @viragomann said in Port Forwarding:

                      10.128.38.210

                      Here this is what you mean?

                      1_1538157157331_port forward2.PNG 0_1538157157331_interface2.PNG

                      1 Reply Last reply Reply Quote 0
                      • V
                        viragomann
                        last edited by

                        Yeah, exactly.

                        Does it work now?

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          sweden_cool @viragomann
                          last edited by

                          @viragomann

                          I do not work with this to have a test server.

                          iperf3.exe -s -p 60722
                          pause
                          
                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by Derelict

                            Set the destination of the NAT translation to OVPN_VPN address.

                            Be sure the rules passing the traffic do not match on the OpenVPN Group tab, but do match on the OVPN_VPN tab. The easiest way to be sure is to not have any rules on the OpenVPN tab. Care will have to be taken if you have other OpenVPN servers or clients defined.

                            Be sure the default gateway of the 192.168.0.233 host is pfSense.

                            Be sure the firewall on 192.168.0.233, if any, passes traffic from arbitrary sources.

                            https://www.netgate.com/docs/pfsense/nat/port-forward-troubleshooting.html

                            If you take more packet captures, please do them on the 192.168.0.0/24 interface the server is on. If you don't see any traffic there, check all of the above again.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.