Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    offloading OpenVPN using external gateway

    Scheduled Pinned Locked Moved Routing and Multi WAN
    70 Posts 2 Posters 14.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      chrispazz @bingo600
      last edited by

      @bingo600 only "ping www.google.it".

      But in first trace I used the raspi as Host capture.

      C bingo600B 2 Replies Last reply Reply Quote 0
      • C
        chrispazz @chrispazz
        last edited by chrispazz

        Ok this is interesting:

        I added a floating rule with no filters but "out" direction and in advanced settings with the Raspi Gateway.

        With this, the connection go correctly thru the Raspi VPN.

        So, the external gateway thur pfsense is working correctly.
        I have to understand why when using a firewall rule in a specific interface is not using Raspi gateway

        1 Reply Last reply Reply Quote 0
        • bingo600B
          bingo600 @chrispazz
          last edited by bingo600

          @chrispazz
          I don't think the first capture is showing the : ping www.google.it
          I think something is pinging the Raspi ... And it's prob the gw-monitor.
          I was fooled there

          It was my mistake concluding the policy route was working, in the first trace we saw.

          A working policy route package would be like the last one you made (google ip)
          but with the RasPI MAC instead of the ISP-Router MAC

          So at the moment pfSense policy routing is NOT working as intended

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          C 1 Reply Last reply Reply Quote 0
          • C
            chrispazz @bingo600
            last edited by chrispazz

            @bingo600 Yes but the rules is matched because it is logged in the pfsense firewall log.
            It only is ignoring the gateway in advanced settings....
            The same rule in "floating" mode is working...

            C 1 Reply Last reply Reply Quote 0
            • C
              chrispazz @chrispazz
              last edited by

              This is really strange, now again the floating rule is not working.
              I will try to reboot pfsense....

              bingo600B 1 Reply Last reply Reply Quote 0
              • bingo600B
                bingo600 @chrispazz
                last edited by

                @chrispazz said in offloading OpenVPN using external gateway:

                This is really strange, now again the floating rule is not working.
                I will try to reboot pfsense....

                Noooooo
                Don't say you're using floating rules , i asked about that

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                C 1 Reply Last reply Reply Quote 0
                • C
                  chrispazz @bingo600
                  last edited by

                  @bingo600
                  I was NOT using floating rules at all.

                  I tried now to see the same rule in floating mode if it works with raspi gateway or not and with floating IT IS working.....

                  Why in floating mode use the specified gateway and in normal not floating mode ignores it?

                  C bingo600B 2 Replies Last reply Reply Quote 0
                  • C
                    chrispazz @chrispazz
                    last edited by chrispazz

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @chrispazz
                      last edited by

                      @chrispazz

                      It shouldn't
                      But AFAIK floating rules are always parsed first.

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      C 1 Reply Last reply Reply Quote 0
                      • C
                        chrispazz @bingo600
                        last edited by

                        @bingo600 Should I open a bug in pfsense? 😧

                        bingo600B 1 Reply Last reply Reply Quote 0
                        • bingo600B
                          bingo600 @chrispazz
                          last edited by

                          @chrispazz
                          Not yet

                          I think one of the mods / gurus should review this thread first.

                          @stephenw10 @johnpoz
                          Any words here

                          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                          pfSense+ 23.05.1 (ZFS)

                          QOTOM-Q355G4 Quad Lan.
                          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                          1 Reply Last reply Reply Quote 0
                          • bingo600B
                            bingo600
                            last edited by

                            I don't hope we have been bitten by NAT 😰
                            The policy rule rule was on a LAN ingress interface , looking at the HOST Source IP of the iMAC. And the Logging showed a match.

                            Technically the source IP is later being set to the pfSense WAN IP, but the new gateway ought to have been set before that.

                            I'm officialy confused šŸ¤•

                            I do hope your policy rule was the top most rule , and that you didn't have any rules before that on that interface , else we'we been chasing ghosts all night.

                            A permit ICMP any any before the policy rule would have made that "ghost"

                            /Bingo

                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                            pfSense+ 23.05.1 (ZFS)

                            QOTOM-Q355G4 Quad Lan.
                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                            C 1 Reply Last reply Reply Quote 0
                            • C
                              chrispazz @bingo600
                              last edited by

                              @bingo600 eheheh

                              Yes, the policy rule is the first one on that interface.

                              C 1 Reply Last reply Reply Quote 0
                              • C
                                chrispazz @chrispazz
                                last edited by

                                I tried some other tests but no luck. I am officially unable to apply that gateway

                                😧

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.