Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Windows Client to WinServer - Windows Built in VPN (GRE) - Only first connection works

    Scheduled Pinned Locked Moved General pfSense Questions
    4 Posts 2 Posters 576 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B
      bingo600
      last edited by bingo600

      I have a strange issue (might be known) , think i see the issue described in the pfSense manual (GRE) issue.

      I have a hosted setup , where the implementor uses the Windows Server Built in VPN as connection method.

      This means i have used the Win10 Client built in VPN to access the service on the server. Aka ... Start the Win VPN , then start the Client program , and make tests. This is done for 3 clients at the same time.

      This is a VoIP service , and i need at least 3 clients to be able to test our functionality.

      2 clients in a call , and when the 3'rd dials one of the other , you should hear a "knock/Incomming-call" in the headset.

      This has worked wo. issues when the Client Vlan used had def-gw on our Cisco ASA.

      Now i have migrated that Vlan to our pfSense firewall , and i was just informed that : "IT DOESN'T WORK" .....

      Well the error report is "correct" ....
      The first Win10 Client VPN always succeds in connecting to the Win10-Server VPN. The next client doesn't.

      All 3 clients can connect provided they are "the first & only".

      On the server i see a message "from memory" ....
      Windows sees a connection , but "blab...blah" .... This is usually if the remote end doesn't permit GRE ... "Blah..Blah".

      If i take one of the PC's and move to my Test-pfSense , i can again connect the first PC , and now i can make a call between the Client on the Prod-Pfsense to the Test-pfSense. Indicating that the server and app works.

      I dug a little into the pfSense doc , and i'm quite sure i saw something about pf having issues with NAT & GRE for more than 1 connection. This seems to be consistent with my experience.
      Solution to use one public IP per connection šŸ¤•

      1:
      Can anyone confirm that the above pf limit is correct ?

      2:
      Does anyone have a "better workaround" than multi public ip's ?
      Or do i have to put my Cisco ASA in production again , and make a "Win-VPN VLAN" that has def-gw via the ASA , as the ASA handles Multi Clients wo. probs. ??

      PS: Changing the server VPN away from the M$ C..p is unfortunately not an option.

      Tips/Hints are welcome.

      /Bingo

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Yeah sounds like you're hitting a state limit in pf.
        GRE has no concept of ports so the state on WAN is simply the WAN IP to the destination IP for protocol GRE. That's a problem if more than one client behind the firewall want to access the same remote server.

        But that is almost never an issue since PPTP is thankfully almost never used anymore.
        https://docs.netgate.com/pfsense/en/latest/nat/compatibility.html#pptp-gre

        Are they really still using that in Win10? in 2020?

        Steve

        1 Reply Last reply Reply Quote 0
        • bingo600B
          bingo600
          last edited by

          Thanx Steve

          I guess it's back to putting the ASA in production again.

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Maybe no choice if they are really using PPTP still.

            If they are using GRE over IPSec which I would expect to find more commonly it implies they might not be encrypting it correctly.

            Steve

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.