Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NTP - poor reach after 20 hours

    Scheduled Pinned Locked Moved General pfSense Questions
    51 Posts 5 Posters 11.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @AKEGEC
      last edited by johnpoz

      Zero reason to block those - they are already blocked by the default block rule on the wan. The only reason you would block is to not log them.

      Or if you had port forwards, and you didn't want specific IPs to hit your port forwards.

      I think there is something really odd with your setup... I just don't see how some opt1 interface, or any interface at all really would ever see your own IP as inbound traffic for a block.. Makes zero sense..

      Even if you had 2 wan interfaces, and opt1 was another wan interface.. Why would wan 1 send traffic to wan2 with destination other than your wan2 IP, etc..

      How about you draw up how you have everything connected. And exactly what is this opt1 interface? What IP do you have on it? Just at a complete loss to how you would see such traffic..

      Normally you have say this

      internet -- wan (pfsense) lan/optX -- your networks(s)

      How could you ever see traffic from your wan IP, hitting your lan side interfaces, or really any other interface even a wan?? If if you had your wan and lan on the same L2 network.. Why would your wan be sending traffic to your opt1 mac address? Just at a loss to how you are seeing such traffic..

      edit?

      Also setup openvpn on OPT1

      Huh?? Still at a loss to how you would see source traffic of your external IP? Opt1 is setup as vpn client interface? Lets take a look at the details of exactly how your setup.. And if you have some vpn client setup... Turn all that off! Atleast while trying to figure out why your ntp is show sporadic in getting responses. We can always walk through how to correctly setup some vpn client after you fix your original ntp issue.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      F 2 Replies Last reply Reply Quote 0
      • F
        farmerjohn @johnpoz
        last edited by

        @johnpoz
        em0 - WAN
        em1 - LAN
        ovpnc4 (vpn provider) - OPT1. i have a few clients on LAN that use this as gateway.

        pfsense-NAT-outbound.png

        1 Reply Last reply Reply Quote 0
        • F
          farmerjohn @johnpoz
          last edited by

          @johnpoz

          Turn all that off!

          ok - disabled 1. VPN / client / my provider and 2. the LAN rule for OPT1 gateway (vpn_clients alias).

          The NTP status seems to have suddenly improved after just 10 minutes. looks like will be all 377's in a few minutes! so what did I do wrong with my vpn client setup?

          [2.5.1-RELEASE][admin@pfsense.home]/var/log: ntpq -p
               remote           refid      st t when poll reach   delay   offset  jitter
          ==============================================================================
          +time.cloudflare 10.14.12.181     3 u   79  256  377   22.335   -1.920   0.680
          -rolex.netservic 64.113.44.55     2 u  210  256  177   27.977   +1.981   1.938
          +rb.steadfastdns 208.100.0.253    2 u   48  256  177   22.434   -1.686   4.161
          -time.skylineser 130.207.244.240  2 u  120  256  177   25.379   -3.370   0.421
          *n1.taur.dk      .PPS.            1 u   36  256  177  131.326   -2.014   3.197
          
          
          
          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @farmerjohn
            last edited by johnpoz

            @farmerjohn

            Why would you set this?

            this.png

            Or the other one for wan? for 127/8 ?

            Not sure why you would set hybrid for something your doing in auto anyway?

            edit: Did you setup a static on opt1 and set a gateway? Auto nat would of never created that unless it thought it was a normal wan connection, a gateway was put on it??

            But it never would of set those ports? Really confused on how that would of be auto generated like the description says.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            F 2 Replies Last reply Reply Quote 0
            • F
              farmerjohn @johnpoz
              last edited by

              @johnpoz

              Did you setup a static on opt1 and set a gateway? Auto nat would of never created that unless it thought it was a normal wan connection, a gateway was put on it??

              no static routes. here are the Gateways.Screenshot from 2021-04-16 22-27-36.png

              1 Reply Last reply Reply Quote 0
              • F
                farmerjohn @johnpoz
                last edited by

                @johnpoz
                Regarding NAT rules, I copied the wan rules and adjusted for OPT1 according to vpn provider's instructions.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @farmerjohn
                  last edited by johnpoz

                  @farmerjohn said in NTP - poor reach after 20 hours:

                  according to vpn provider's instructions.

                  And what clueless vpn was this? Do you have a guide you followed?

                  Yah normally need just 1 hybrid rule ;)

                  lookatthat.png

                  edit:
                  BTW.. Even if you wanted to send other traffic down a vpn connection from pfsense - your dns for example. If wouldn't ever be a good idea to try an do ntp through a vpn connection.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  F 2 Replies Last reply Reply Quote 1
                  • F
                    farmerjohn @johnpoz
                    last edited by

                    @johnpoz
                    Travelling for next few days, will try your example when get back. Thank you.

                    1 Reply Last reply Reply Quote 0
                    • F
                      farmerjohn @johnpoz
                      last edited by farmerjohn

                      @johnpoz
                      I like the simplicity of your example, how would I get there from my current setup? Just delete All my NAT rules - clean slate?

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @farmerjohn
                        last edited by

                        Yeah just delete all those hybrids you have.. No idea why any guide would say you need those.. Especially those with specific ports 1024:65k

                        What guide did you follow?

                        Also the other thing pretty much every vpn service guide I have looked at wants you to route everything through them.. When most likely you don't want that.. Don't pull routes in your client config, and then just policy route what "you" want to send down the vpn. Which could be all if you want, but ntp down a vpn is going to be a horrible setup.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 1
                        • F
                          farmerjohn
                          last edited by

                          @johnpoz
                          I deleted all the Outbound NAT rules and added one as you suggested. I also disabled 'pull routes' in client config. Everything working well so far and NTP status is still showing 377's for the five individual servers.

                          I presently have 1.1.1.1 and 9.9.9.9 in System > general > DNS servers. Leak tests showing VPN public IP (good) and DNS servers as cloudflare and quad9 (should I care? Is it cloudflare trust vs VPN provider trust?). Here are my DNS Resolver settings in case I'm wrong/confused on something.

                          pfsense-DNS-Resolver-settings.png

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.