Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port forward throgh vpn

    Scheduled Pinned Locked Moved NAT
    17 Posts 4 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      avkr @viragomann
      last edited by

      @viragomann Thanks for replying. PRIVADO_VPN is a client and that one I am using for the port forward. OpenVPN is a server, I am not using that one for port forwarding.

      Here are also the interfaces :
      afae2e34-1e8a-439c-8229-ab264abd7304-image.png

      Here are the rules for OpenVPN, I also disabled them for testing and it still doesn't work (what you see in the picture is normally active but it doesn't make a difference):
      3d781a53-b6b1-4e53-af52-83bf10875bf0-image.png
      I reposted this image so it's more clear :
      The difference here from the original post is that I disabled the pfb_PRI1 rule as @Bob-Dig suggested.
      d521ee6a-2e4e-4f04-8d85-6a42ead52416-image.png

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @avkr
        last edited by

        @avkr said in Port forward throgh vpn:

        OpenVPN is a server

        That is not correct. OpenVPN is an implicit interface group containing all OpenVPN instances running on pfSense. So as well the client.
        If you want to separate the servers filter rules, assign an interface to the server instance also.

        @avkr said in Port forward throgh vpn:

        Here are the rules for OpenVPN, I also disabled them for testing and it still doesn't work (what you see in the picture is normally active but it doesn't make a difference):

        Did you also clear the states after disabling the rules?

        A 1 Reply Last reply Reply Quote 1
        • A
          avkr @viragomann
          last edited by

          @viragomann said in Port forward throgh vpn:

          That is not correct. OpenVPN is an implicit interface group containing all OpenVPN instances running on pfSense. So as well the client.
          If you want to separate the servers filter rules, assign an interface to the server instance also.

          i did not know this. thanks. I assigned another interface as you suggested.

          4a0f5f96-a7a8-4d88-8f95-852db5e17691-image.png

          @viragomann said in Port forward throgh vpn:

          Did you also clear the states after disabling the rules?

          Before I didn't, but I tried also resetting the states now, it still behaves like before.

          I have another question though, something that came to my mind, maybe I will say something stupid but here it goes anyway:

          When I open the port doesn't it also need to be somehow configured also on the server-side where the privado client connects? Maybe I need to configure something in the client configuration (which I got from the VPN provider).

          A V 2 Replies Last reply Reply Quote 0
          • A
            avkr @avkr
            last edited by

            @viragomann I also completely disabled the OpenVPN server, the interface(ovpns2), and the rules associated with it then reset the states, and still doesn't work.

            1 Reply Last reply Reply Quote 0
            • V
              viragomann @avkr
              last edited by viragomann

              @avkr
              It's not a good advice to call an interface "OpenVPN", cause this is an implicit interface group, which is present if any OpenVPN instance is configured on pfSense.
              So you will have two "OpenVPN" tabs now, which may lead to confusions.

              @avkr said in Port forward throgh vpn:

              When I open the port doesn't it also need to be somehow configured also on the server-side where the privado client connects? Maybe I need to configure something in the client configuration (which I got from the VPN provider).

              On the server side the traffic has to be forwarded to you, of course. We assume, that this is already given.

              @avkr said in Port forward throgh vpn:

              I also completely disabled the OpenVPN server, the interface(ovpns2), and the rules associated with it then reset the states, and still doesn't work.

              It's not a question of a running server instance, but of the rules on the OpenVPN interface group tab.
              Also check the floating rules.

              A 1 Reply Last reply Reply Quote 0
              • A
                avkr @viragomann
                last edited by

                @viragomann i will save my current configuration and then do a factory reset, then configure everything only with the privado client and my port forward rule to 192.168.1.106 on a fresh install and then ask advice then from there because like this it's hard to identify the problem. As I understand it there may be something that could interfere with my rule and that's why it's not working. thanks for the advice so far.

                V Bob.DigB 2 Replies Last reply Reply Quote 0
                • V
                  viragomann @avkr
                  last edited by

                  @avkr
                  So you're sure that you get the traffic forwarded from the VPN provider to the stated port?

                  To troubleshoot do a packet capture on the vpn client interface to check if the packets arrive there.
                  If so, do a capture on the internal interface to see if the server is responding.

                  A 1 Reply Last reply Reply Quote 0
                  • Bob.DigB
                    Bob.Dig LAYER 8 @avkr
                    last edited by

                    @avkr No need to do that. Don't have any rules on the so called OpenVPN Interface and only do it on the specific interface.
                    Make sure, that your vpn provider really gave you that port and as protocol TCP.

                    1 Reply Last reply Reply Quote 0
                    • A
                      avkr @viragomann
                      last edited by

                      @viragomann said in Port forward throgh vpn:

                      So you're sure that you get the traffic forwarded from the VPN provider to the stated port?

                      No, I am not sure.

                      To troubleshoot do a packet capture on the vpn client interface to check if the packets arrive there.
                      If so, do a capture on the internal interface to see if the server is responding.

                      I did something but i am not sure this is correct:

                      I used the online port check tool ([https://www.yougetsignal.com/tools/open-ports/](link url)) to verify first if the other port forward rule (from WAN to 192.168.1.102:32400 ) works and did packet capture (As this is the first time i did this in my life i want to see a difference between working/not working and try to be methodical )

                      Packet capture on WAN while the tool is checking (the painted IP is my public WAN IP, 192.168.178.XX is the IP my pfsense box gets from my cable modem, pf sense is connected to a DMZ port on the cable modem ):
                      fb0c1f01-bca3-4de7-a2e7-bf776908646e-image.png

                      19:59:44.944566 IP 198.199.98.246.59477 > 192.168.178.XX.32400: tcp 0
                      19:59:44.944964 IP 192.168.178.XX.32400 > 198.199.98.246.59477: tcp 0

                      Now on the LAN:

                      20:03:04.840298 IP 198.199.98.246.60224 > 192.168.1.102.32400: tcp 0
                      20:03:04.840647 IP 192.168.1.102.32400 > 198.199.98.246.60224: tcp 0

                      Out of my limited knowledge, i can conclude here that a package arrived on the WAN on port 32400 and got forwarded to the correct IP (192.168.1.102 port 32400) so the rules do what it should do.

                      So now the same but testing the rule PRIVADO to 192.168.1.106:51413

                      Packet capture on privado while the port check tool is running(painted IP is the public IP from PRIVADO) :
                      2273dde7-d94f-4f70-bcb9-5199f92e9dcd-image.png

                      here the packet capture gets nothing from 198.199.98.246(which i am 100% sure is the IP from the port check tool). the window is blank.
                      78c10e56-6d9a-4a77-94d9-86ca0d60b01b-image.png

                      now on the LAN

                      20:13:40.608865 IP 192.168.1.106.51413 > 66.183.144.106.46010: UDP, length 28
                      20:13:40.608890 IP 192.168.1.106.51413 > 178.143.35.38.26146: UDP, length 28
                      20:13:41.126421 IP 192.168.1.106.51413 > 66.183.144.106.46010: UDP, length 28

                      I only see that my 192.168.106 IP wants to go outside but nothing from the outside to it in the same way as for the first rule. nothing from 198.199.98.246

                      After testing the second rule the conclusion that I draw is that packets are not coming into my privado client so that means whatever I do it won't work because the server to which the client connects cuts them off somewhere on the way. AKA my provider sucks.

                      I repeated these tests a couple of times every time with the same result.

                      Can you please confirm what I did is correct so I am not running around in circles as I did for the past few days?

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @avkr
                        last edited by

                        @avkr said in Port forward throgh vpn:

                        So now the same but testing the rule PRIVADO to 192.168.1.106:51413
                        Packet capture on privado while the port check tool is running(painted IP is the public IP from PRIVADO)
                        here the packet capture gets nothing from 198.199.98.246(which i am 100% sure is the IP from the port check tool). the window is blank.

                        Did you set any filter in the capture here like host or port or protocol?

                        Possibly the provider nats the sorce IP, but that shouldn't be done at all.

                        So if not having filters and you see nothing, the packets are not forwarded to you.

                        A 2 Replies Last reply Reply Quote 1
                        • A
                          avkr @viragomann
                          last edited by

                          @viragomann i set a filter on the ports of interest, not on the IP.

                          1 Reply Last reply Reply Quote 0
                          • A
                            avkr @viragomann
                            last edited by

                            @viragomann thanks a lot for helping out

                            1 Reply Last reply Reply Quote 0
                            • H
                              hazeltorres
                              last edited by

                              This post is deleted!
                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.