Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Another different pfSense problem (was "Different WireGuard Problem")

    WireGuard
    2
    5
    877
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      chuckm2000
      last edited by

      Re: A Different WireGuard Problem

      I have discovered something very interesting (and troublesome) related to pfSense. I had originally thought it was a WireGuard problem, but now I'm having the same issue using OpenVPN via the same firewall.

      I have two pfSense firewalls on two separate public IP addresses. Behind one of them I have a small server running OpenVPN. If I connect an OVPN client to the same LAN behind the server's firewall, everything works well, as expected.

      If I connect an OVPN client to the LAN on the other firewall, the initial TLS handshake seems to happen but the tunnel is not instantiated and no traffic flows out to the Internet. This is similar to WireGuard where the initial connection works but then all subsequent traffic goes nowhere.

      BUT .... here is the intriguing part .... if I tether that same client to my iPhone over WiFi so traffic goes via my phone's data plan, everything works well.

      It seems outbound VPN traffic doesn't make it to the Internet thru pfSense. I should point out that all other traffic is ok. That firewall is my primary Internet connection and everything else works well. Maybe it's the VPN inbound traffic that isn't being allowed.

      So .... what could be causing pfSense to not allow VPN traffic (OVPN or WireGuard) to the Internet? Do I need some sort of outbound setting? Currently that firewall is wide open outbound, so it's just a bunch of encrypted packets on a UDP port. The VPN client's inbound port is randomly chosen but that is after the established connection is made.

      Any thoughts? Am I doing something stupid?

      Thanks in advance, Chuck

      V 1 Reply Last reply Reply Quote 0
      • V
        vajonam Rebel Alliance @chuckm2000
        last edited by

        @chuckm2000

        make sure you set up your outbound NAT if you want to route traffic to the internet via that vpn network.

        C 1 Reply Last reply Reply Quote 0
        • C
          chuckm2000 @vajonam
          last edited by

          @vajonam said in Another different pfSense problem (was "Different WireGuard Problem"):

          @chuckm2000

          make sure you set up your outbound NAT if you want to route traffic to the internet via that vpn network.

          Thanks for the reply. In my ignorance I was not aware that this had to be done for a VPN.

          I find the Outbound NAT config page to be non-intuitive, so I'm not sure how to correctly set it up.

          Detailed settings advice would be very much appreciated .......
          OpenVPN clients are on 192.168.10.9/24 using the assigned VPN server's UDP port. Tunnels get IP addresses assigned on subnet 192.168.69.0/24 with randomly chosen UDP return ports.

          Thanks again!
          Chuck

          V 1 Reply Last reply Reply Quote 0
          • V
            vajonam Rebel Alliance @chuckm2000
            last edited by

            @chuckm2000

            You need a simple NAT that says for

            024704d4-81f5-459d-874d-a765ed717b5a-image.png

            Something like that you can get more restrictitive

            Then you will need need to add a firewall rule that says for clients coming in on an interface when reach non local network send out through a specific gateway.

            C 1 Reply Last reply Reply Quote 0
            • C
              chuckm2000 @vajonam
              last edited by

              @vajonam

              Thanks so much for the advice! I was thinking it would be a lot more complex than that :-)

              This particular firewall has clients only, the other firewall forwards the OVPN port to its server with no problems.

              Another lesson learned, with my appreciation!

              Cheers, Chuck

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.