Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NTP - poor reach after 20 hours

    Scheduled Pinned Locked Moved General pfSense Questions
    51 Posts 5 Posters 12.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      farmerjohn @johnpoz
      last edited by

      @johnpoz
      em0 - WAN
      em1 - LAN
      ovpnc4 (vpn provider) - OPT1. i have a few clients on LAN that use this as gateway.

      pfsense-NAT-outbound.png

      1 Reply Last reply Reply Quote 0
      • F
        farmerjohn @johnpoz
        last edited by

        @johnpoz

        Turn all that off!

        ok - disabled 1. VPN / client / my provider and 2. the LAN rule for OPT1 gateway (vpn_clients alias).

        The NTP status seems to have suddenly improved after just 10 minutes. looks like will be all 377's in a few minutes! so what did I do wrong with my vpn client setup?

        [2.5.1-RELEASE][admin@pfsense.home]/var/log: ntpq -p
             remote           refid      st t when poll reach   delay   offset  jitter
        ==============================================================================
        +time.cloudflare 10.14.12.181     3 u   79  256  377   22.335   -1.920   0.680
        -rolex.netservic 64.113.44.55     2 u  210  256  177   27.977   +1.981   1.938
        +rb.steadfastdns 208.100.0.253    2 u   48  256  177   22.434   -1.686   4.161
        -time.skylineser 130.207.244.240  2 u  120  256  177   25.379   -3.370   0.421
        *n1.taur.dk      .PPS.            1 u   36  256  177  131.326   -2.014   3.197
        
        
        
        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @farmerjohn
          last edited by johnpoz

          @farmerjohn

          Why would you set this?

          this.png

          Or the other one for wan? for 127/8 ?

          Not sure why you would set hybrid for something your doing in auto anyway?

          edit: Did you setup a static on opt1 and set a gateway? Auto nat would of never created that unless it thought it was a normal wan connection, a gateway was put on it??

          But it never would of set those ports? Really confused on how that would of be auto generated like the description says.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          F 2 Replies Last reply Reply Quote 0
          • F
            farmerjohn @johnpoz
            last edited by

            @johnpoz

            Did you setup a static on opt1 and set a gateway? Auto nat would of never created that unless it thought it was a normal wan connection, a gateway was put on it??

            no static routes. here are the Gateways.Screenshot from 2021-04-16 22-27-36.png

            1 Reply Last reply Reply Quote 0
            • F
              farmerjohn @johnpoz
              last edited by

              @johnpoz
              Regarding NAT rules, I copied the wan rules and adjusted for OPT1 according to vpn provider's instructions.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @farmerjohn
                last edited by johnpoz

                @farmerjohn said in NTP - poor reach after 20 hours:

                according to vpn provider's instructions.

                And what clueless vpn was this? Do you have a guide you followed?

                Yah normally need just 1 hybrid rule ;)

                lookatthat.png

                edit:
                BTW.. Even if you wanted to send other traffic down a vpn connection from pfsense - your dns for example. If wouldn't ever be a good idea to try an do ntp through a vpn connection.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                F 2 Replies Last reply Reply Quote 1
                • F
                  farmerjohn @johnpoz
                  last edited by

                  @johnpoz
                  Travelling for next few days, will try your example when get back. Thank you.

                  1 Reply Last reply Reply Quote 0
                  • F
                    farmerjohn @johnpoz
                    last edited by farmerjohn

                    @johnpoz
                    I like the simplicity of your example, how would I get there from my current setup? Just delete All my NAT rules - clean slate?

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @farmerjohn
                      last edited by

                      Yeah just delete all those hybrids you have.. No idea why any guide would say you need those.. Especially those with specific ports 1024:65k

                      What guide did you follow?

                      Also the other thing pretty much every vpn service guide I have looked at wants you to route everything through them.. When most likely you don't want that.. Don't pull routes in your client config, and then just policy route what "you" want to send down the vpn. Which could be all if you want, but ntp down a vpn is going to be a horrible setup.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 1
                      • F
                        farmerjohn
                        last edited by

                        @johnpoz
                        I deleted all the Outbound NAT rules and added one as you suggested. I also disabled 'pull routes' in client config. Everything working well so far and NTP status is still showing 377's for the five individual servers.

                        I presently have 1.1.1.1 and 9.9.9.9 in System > general > DNS servers. Leak tests showing VPN public IP (good) and DNS servers as cloudflare and quad9 (should I care? Is it cloudflare trust vs VPN provider trust?). Here are my DNS Resolver settings in case I'm wrong/confused on something.

                        pfsense-DNS-Resolver-settings.png

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.