Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Vonage not working with pfBlockerNG enabled

    Scheduled Pinned Locked Moved pfBlockerNG
    18 Posts 4 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Raffi_R
      Raffi_
      last edited by Raffi_

      When you disable DNSBL did you also do a force reload on the update tab? That might explain why it didn't seem to work when disabling DNSBL the second time.

      95180afc-e4eb-4934-a6a4-0a7c60cd585b-image.png

      I hate to state the obvious, but based on what you're describing it sounds like a list you have on DNSBL might be blocking the Vonage servers. You'll have to search through those lists. To figure out what to search for you'll have to find out which IP's Vonage servers are using. I couldn't find that info with a quick Google search. Try reaching out to Vonage support to see if they can tell you which IP's and/or domains you should whitelist. That could give you a clue on which IP's to search for in your lists.

      Edit, if you can't get any info on the Vonage servers, then you might have to run a packet capture during a call to see what the phones are talking to. Go to Diagnostics > Packet capture. The interface should be LAN and in the Host address put the IP of one of the phones so that you only get the traffic you care about. In the count field, put 10000 or a very high number like that. That'll let capture run for several minutes.

      1 Reply Last reply Reply Quote 0
      • K
        KNG75
        last edited by KNG75

        I did force an update originally and vonage immediately started working. At some point, even with dnsbl disabled and no other changes made, the problem came back. While troubleshooting, I was unable to find any IPs being blocked that was vonage related.
        I even tried excluding the vonage adapter IP from pfBlockerNG but the problem persisted. Ended up just turning pfBlockerNG off completely for now and may look at it again at some point in the future.

        1 Reply Last reply Reply Quote 0
        • Raffi_R
          Raffi_
          last edited by

          If you only have one or very few Vonage adapters, maybe a simpler solution might be to disable DHCP on the Vonage adapter, then manually assign a DNS server on that device directly such as 8.8.8.8. That should not be affected by pfblocker since it won't be using pfSense for DNS queries. That way you won't have to disable pfblocker for the rest of the network.

          K 1 Reply Last reply Reply Quote 0
          • K
            KNG75 @Raffi_
            last edited by

            @Raffi_

            I verified the dhcp settings and the vonage adapter has always used 8.8.8.8 and 8.8.4.4 for its dns entries. It's the strangest thing. No communication to or from the vonage adapter is showing as being blocked by pfblockerng or anything else.

            1 Reply Last reply Reply Quote 0
            • Raffi_R
              Raffi_
              last edited by

              I wasn't clear with what I was trying to say. The way pfblocker works is via DNS queries sent to pfSense. If pfSense is being used as the DNS resolver, then pfblocker will be able to block traffic. If however, the device on the network is not using pfSense for DNS then the device will completely bypass pfblocker. If you want to see an example of this, use firefox with default settings. It has DoH (DNS of HTTPS) enabled by default and I believe it uses Cloudflare for resolution. So regardless of any settings on the PC or the network, firefox will completely bypass pfblocker unless you change that default behavior. You can apply this same concept to your Vonage adapter by NOT using DHCP on that specific adapter and instead manually assign the IP, subnet, gateway, and DNS servers (8.8.8.8 and 8.8.4.4 or whatever you want). Of course, that can only be done if the Vonage adapter has some kind of web GUI or CLI method to manually configure it.

              1 Reply Last reply Reply Quote 0
              • K
                KNG75
                last edited by

                I cannot manually set IP/Mask/Gateway/DNS on the device, however, I can see the IP and DNS entries it's receiving via DHCP on the screen on the adapter. It is getting the 8.8.8.8 and 8.8.4.4 I have configured for it so any dns queries it's making are straight to 8.8.8.8 and not the pfsense dns resolver. Whatever is causing pfblockerng to interfere with vonage voice calls does not appear to be dns related.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Are you using pfblocker in your firewall rules to block IPs?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  K 1 Reply Last reply Reply Quote 0
                  • K
                    KNG75 @johnpoz
                    last edited by

                    @johnpoz No. Not for deny rules. I was using pfblockerng to create an alias of Amazon AWS IPs for allow rules. I disabled those weeks ago as I no longer use those rules.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Well if your setting specific allow rules, that kind of tells me you must not be using the default any any allow? So what are you rules? Post them please.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • K
                        KNG75
                        last edited by KNG75

                        That allow rule was only for smartthings (via AWS) to communicate with home assistant. I got rid of smartthings.

                        I did some more troubleshooting. I unchecked keep settings and completely removed pfblockerng. Reinstalled, enabled and calls work. Added a single, IPv4 permit alias for AWS using https://ip-ranges.amazonaws.com/ip-ranges.json and I can no longer hear audio over vonage voice calls. Nothing else is configured. I then removes the AWS permit alias and calls worked. I then created a dummy IP4 alias and no vonage audio.

                        pfblockerng is now removed permanently from my firewall.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by johnpoz

                          Without you actually posting exactly what you did, there is no way to help you figure out what is going on.. With the default any any rule, why would you need another allow for anything? All is allowed, there is no point to other allow rules, unless you also going to put in a block

                          Again without seeing what you actually did there is no way to help you figure out what is going on.

                          But creating an allow rule for say IP address 1.2.3.4 above a ANY ANY has zero to do with anything.. Where and How exactly where you creating these rules? And you were letting pfblocker auto create rules?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • K
                            KNG75
                            last edited by KNG75

                            I am referring to inbound NAT rules. You are referring to outbound/LAN rules for which I have the default LAN to any rule as well as the default anti lockout rule. That's it. Inbound WAN to LAN I currently have the defaults. No custom rules.

                            The pfblockerng aliases with an alias as an action are not supposed to create any rules or do anything else but create aliases. This should not cause any issues with anything as no firewall rules was even defined to use the aliases I added as a test and pfblocker shows absolutely nothing being blocked in the logs or alerts.

                            As soon as I add anything to IPV4, vonage audio stops working. Even a dummy alias entry breaks it.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by johnpoz

                              If all its doing is creating aliases, that are not even used in rules... Or are for example then how would that effect traffic.. Makes no sense.

                              Why don't you sniff and actually see what is going on vs guessing that its xyz with no actual details to go on..

                              I run pfblocker in alias mode and have not seen any issues with anything not working... I don't use vontage and off the top of my head not sure how whatever your doing is works from a protocol standpoint.. But having an alias that has 1.2.3.4 in it would have zero to do with anything.. You have pfblocker removed right, ok create an alias with some IPs in it.. That is all pfblocker is doing when its in alias mode.

                              edit: So quick google looks like you could need these ports forwarded
                              https://support.vonage.com/articles/answer/Port-Forwarding-690
                              SIP: Port 5061 UDP (Used to send and receive SIP information)

                              RTP: Ports 10000-20000 UDP. (Used to send and receive RTP traffic) When a call is made, random ports between 10000 and 20000 are used to carry the conversation. If any of these ports are blocked, you may experience one way or no audio.

                              But you say you have no rules on wan? So your trying to use UPnP to open these ports?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • billlB
                                billl
                                last edited by

                                I have some input that might be useful for you. I have a Vonage machine that is the only device on this VLAN with the following (hastily written) rules:
                                170VoipRules.png
                                The referenced VonagePorts are defined as follows:
                                VonagePorts.png
                                Everything seems to be working fine with this, calls go out and calls come in, all using outgoing connections only. There are no port forwards on the WAN. I have confirmed this with a port scan - no open ports.
                                I have a somewhat-wild guess why you might be having inconsistent results with your unit. The only documentation that I have found for Vonage ports talks about using ports 10000:20000. At some point, I recall finding out about that range needing instead to be 10000:25000, and recently I discovered it using port 27830. I've got VonagePorts set to 10000:30000 right now, but will probably just open that rule up to any port, in order to save myself aggravation down the road. I wonder if you have been using the documented 10000:20000 and just by coincidence getting lucky with a port below 20000 sometimes, and unlucky with a port above 20000 sometimes?

                                1 Reply Last reply Reply Quote 0
                                • billlB
                                  billl
                                  last edited by

                                  I forgot to mention above that I'm also using pfBlockerNG-devel, with pretty basic config and lists for both DNSBL and IP. I don't have anything whitelisted for Vonage.

                                  I just ran a packet capture while placing calls to and from the Vonage phone, and it used the following destinations:
                                  ec2-18-217-95-147.us-east-2.compute.amazonaws.com.21100 (UDP)
                                  ec2-54-219-107-58.us-west-1.compute.amazonaws.com.10000 (UDP)

                                  Maybe do a DNS lookup on those domains and see what you get?

                                  1 Reply Last reply Reply Quote 0
                                  • billlB
                                    billl
                                    last edited by

                                    I'm starting to like my somewhat-wild guess :)
                                    I dropped VonagePorts down to 10000:20000, and the phones ring but you can't hear anyone talking.

                                    1 Reply Last reply Reply Quote 1
                                    • Raffi_R
                                      Raffi_
                                      last edited by Raffi_

                                      This makes more sense than pfblocker being the issue. Another option would be to assign your phone(s) a static lease through DHCP and then create a rule which allows any traffic from that IP out from any port. I don't have Vonage, but in the office we have a different VOIP service and that's what I ended up doing. I followed all the documentation and opened all the ports they said were required and still had issues on some phones, so I got tired of that game. I added all phones to an alias and with one rule solved all those issues.

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.