Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense blocking outgoing OpenVPN traffic

    Scheduled Pinned Locked Moved OpenVPN
    11 Posts 5 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      warnerthuis
      last edited by warnerthuis

      Hi,
      We have a firewall with an OpenVPN incoming connection on port 1194.
      Now I want from behind this fw to connect to a remote system with also port 1194 but the traffic never arrives there. An other external system does work, but that uses port 1195.
      Is it possible to get this working?
      Should I make some nat-rule or so?

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @warnerthuis
        last edited by

        @warnerthuis

        You have to break down where it's failing. My bet is on routing.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        bingo600B 1 Reply Last reply Reply Quote 0
        • bingo600B
          bingo600 @JKnott
          last edited by

          My money are on the "dual use" of 1194

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          JKnottJ 1 Reply Last reply Reply Quote 0
          • RicoR
            Rico LAYER 8 Rebel Alliance
            last edited by Rico

            pfSense/OpenVPN is using a random dynamic port for client connections by default, you can have hundreds outgoing OpenVPN connections to port 1194 with no problem.

            pfSense_OpenVPN_Client_Port.png

            -Rico

            bingo600B 1 Reply Last reply Reply Quote 0
            • JKnottJ
              JKnott @bingo600
              last edited by

              @bingo600

              Given those 2 1194s are on different systems means that is not a problem. The IP sockets are based on port number and address. The source port is a random number that is not reserved for any service.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              1 Reply Last reply Reply Quote 0
              • bingo600B
                bingo600 @Rico
                last edited by

                @rico
                @JKnott
                I read it as he had an OpenVPN "Server daemon" running on his fw, listening on incomming 1194.

                And ... dooh (seems my money are lost) 🤄
                He uses a random outbound port towards the "other" 1194.

                My initial thought was that the OpenVPN Server daemon took exclusive ownership of 1194, but that would be inbound.

                Always glad to discover new stuff

                /Bingo

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                M 1 Reply Last reply Reply Quote 0
                • M
                  marvosa @bingo600
                  last edited by

                  Too many unknowns. By default, no outgoing traffic is blocked on PFsense, so without more insight into both networks, all we can do is start looking at the usual suspects. Is the initial connection from the client to the server being made? If not, I'd start looking at the logs on the edge firewall on the client-side. Is there an edge device on the remote side also? If so, that's another point of failure to be investigated along with PFsense on the remote end.

                  If the tunnel is up, but no traffic is passing, then we'd need to start looking at the server-side config, routing tables, and firewall rules on both ends including edge devices.

                  1 Reply Last reply Reply Quote 0
                  • W
                    warnerthuis
                    last edited by

                    To be more specific: I have 3 locations: my home, a work location and where I host my servers. All 3 locations have OpenVPN server, my home at port 1195 the other 2 at port 1194. From home I can connect to both locations and from my work I can access my home. But from work I cannot reach where my server is hosted. Someone has been packetsniffing there and no traffic comes in from my work location.
                    So I assumed that the server at work is blocking the outgoing traffic to my hostsite. All sites run latest version 64-bit.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      marvosa @warnerthuis
                      last edited by

                      @warnerthuis said in pfSense blocking outgoing OpenVPN traffic:

                      To be more specific: I have 3 locations: my home, a work location and where I host my servers. All 3 locations have OpenVPN server, my home at port 1195 the other 2 at port 1194. From home I can connect to both locations and from my work I can access my home. But from work I cannot reach where my server is hosted. Someone has been packetsniffing there and no traffic comes in from my work location.
                      So I assumed that the server at work is blocking the outgoing traffic to my hostsite. All sites run latest version 64-bit.

                      Thanks for the info. Although, it's still way too high level. What is the topology between the 3 sites... mesh, hub-and-spoke, etc? PKI or Shared Key setup? Are all three locations running PFsense at the edge? Are the OpenVPN server(s) running on PFsense or something else?

                      W 1 Reply Last reply Reply Quote 0
                      • W
                        warnerthuis @marvosa
                        last edited by

                        @marvosa The 3 sites are at different geographical locations, so in between is 'internet'. All 3 are running on PFSense. Home is behind a NAT on a DMZ with everything forwarded on a physical machine. The other 2 are connected directly to internet. Work is running on a physical machine, hosting server is running on a virtual machine on ProxMox.
                        At work it is layer3-tunnel mode, TLS-key, encryption AES-265-CBC, NCP AES-128-GCM, servermode: Remote Access ( SSL/TLS + User Auth )

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          marvosa @warnerthuis
                          last edited by

                          @warnerthuis So, the issue lies in the tunnel between work and the hosting site. Post the server1.conf from the server and client1.conf from the client.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.