NTP - poor reach after 20 hours
-
Zero reason to block those - they are already blocked by the default block rule on the wan. The only reason you would block is to not log them.
Or if you had port forwards, and you didn't want specific IPs to hit your port forwards.
I think there is something really odd with your setup... I just don't see how some opt1 interface, or any interface at all really would ever see your own IP as inbound traffic for a block.. Makes zero sense..
Even if you had 2 wan interfaces, and opt1 was another wan interface.. Why would wan 1 send traffic to wan2 with destination other than your wan2 IP, etc..
How about you draw up how you have everything connected. And exactly what is this opt1 interface? What IP do you have on it? Just at a complete loss to how you would see such traffic..
Normally you have say this
internet -- wan (pfsense) lan/optX -- your networks(s)
How could you ever see traffic from your wan IP, hitting your lan side interfaces, or really any other interface even a wan?? If if you had your wan and lan on the same L2 network.. Why would your wan be sending traffic to your opt1 mac address? Just at a loss to how you are seeing such traffic..
edit?
Also setup openvpn on OPT1
Huh?? Still at a loss to how you would see source traffic of your external IP? Opt1 is setup as vpn client interface? Lets take a look at the details of exactly how your setup.. And if you have some vpn client setup... Turn all that off! Atleast while trying to figure out why your ntp is show sporadic in getting responses. We can always walk through how to correctly setup some vpn client after you fix your original ntp issue.
-
@johnpoz
em0 - WAN
em1 - LAN
ovpnc4 (vpn provider) - OPT1. i have a few clients on LAN that use this as gateway. -
Turn all that off!
ok - disabled 1. VPN / client / my provider and 2. the LAN rule for OPT1 gateway (vpn_clients alias).
The NTP status seems to have suddenly improved after just 10 minutes. looks like will be all 377's in a few minutes! so what did I do wrong with my vpn client setup?
[2.5.1-RELEASE][admin@pfsense.home]/var/log: ntpq -p remote refid st t when poll reach delay offset jitter ============================================================================== +time.cloudflare 10.14.12.181 3 u 79 256 377 22.335 -1.920 0.680 -rolex.netservic 64.113.44.55 2 u 210 256 177 27.977 +1.981 1.938 +rb.steadfastdns 208.100.0.253 2 u 48 256 177 22.434 -1.686 4.161 -time.skylineser 130.207.244.240 2 u 120 256 177 25.379 -3.370 0.421 *n1.taur.dk .PPS. 1 u 36 256 177 131.326 -2.014 3.197
-
Why would you set this?
Or the other one for wan? for 127/8 ?
Not sure why you would set hybrid for something your doing in auto anyway?
edit: Did you setup a static on opt1 and set a gateway? Auto nat would of never created that unless it thought it was a normal wan connection, a gateway was put on it??
But it never would of set those ports? Really confused on how that would of be auto generated like the description says.
-
Did you setup a static on opt1 and set a gateway? Auto nat would of never created that unless it thought it was a normal wan connection, a gateway was put on it??
no static routes. here are the Gateways.
-
@johnpoz
Regarding NAT rules, I copied the wan rules and adjusted for OPT1 according to vpn provider's instructions. -
@farmerjohn said in NTP - poor reach after 20 hours:
according to vpn provider's instructions.
And what clueless vpn was this? Do you have a guide you followed?
Yah normally need just 1 hybrid rule ;)
edit:
BTW.. Even if you wanted to send other traffic down a vpn connection from pfsense - your dns for example. If wouldn't ever be a good idea to try an do ntp through a vpn connection. -
@johnpoz
Travelling for next few days, will try your example when get back. Thank you. -
@johnpoz
I like the simplicity of your example, how would I get there from my current setup? Just delete All my NAT rules - clean slate? -
Yeah just delete all those hybrids you have.. No idea why any guide would say you need those.. Especially those with specific ports 1024:65k
What guide did you follow?
Also the other thing pretty much every vpn service guide I have looked at wants you to route everything through them.. When most likely you don't want that.. Don't pull routes in your client config, and then just policy route what "you" want to send down the vpn. Which could be all if you want, but ntp down a vpn is going to be a horrible setup.
-
@johnpoz
I deleted all the Outbound NAT rules and added one as you suggested. I also disabled 'pull routes' in client config. Everything working well so far and NTP status is still showing 377's for the five individual servers.I presently have 1.1.1.1 and 9.9.9.9 in System > general > DNS servers. Leak tests showing VPN public IP (good) and DNS servers as cloudflare and quad9 (should I care? Is it cloudflare trust vs VPN provider trust?). Here are my DNS Resolver settings in case I'm wrong/confused on something.