Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port Forwarding OVPN

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 6 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sweden_cool
      last edited by

      Hi,

      Have now tried almost half a year without succeeding in getting it to work so now I turn to you.

      My English is not that good but I do my best.

      packet capture

      10:43:08.186977 IP 198.199.98.246.47710 > 10.128.56.178.60720: tcp 0
      10:43:09.185305 IP 198.199.98.246.47714 > 10.128.56.178.60720: tcp 0
      10:43:09.186709 IP 198.199.98.246.47710 > 10.128.56.178.60720: tcp 0
      10:43:10.177710 IP 198.199.98.246.47718 > 10.128.56.178.60720: tcp 0
      10:43:10.183702 IP 198.199.98.246.47714 > 10.128.56.178.60720: tcp 0
      10:43:11.174881 IP 198.199.98.246.47718 > 10.128.56.178.60720: tcp 0
      

      6_1545904681703_Rules OVPN_VPN.PNG 5_1545904681703_Outbound.PNG 4_1545904681702_Network Address Translation.PNG 3_1545904681702_NAT.PNG 2_1545904681702_NAT Edit.PNG 1_1545904681702_Interfaces.PNG 0_1545904681702_DNS Server Settings.PNG

      When I go to yougetsignal.com and check if the gate is open, it shows closed but when I troubleshoot with packet capture then the package will arrive then I do not know how to solve so that it comes to the right computer.

      I hope the pictures explain better than my words.

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        For clarification, always mention on which device and which interface a packet capture was taken.
        Same with firewall rules.

        OpenVPN server and client configuration?
        What exactly are your trying to achieve?

        S 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by johnpoz

          So your trying to forward traffic that hits your vpn server?

          Where exactly did you sniff that at? Does your vpn service/server even forward traffic? Which vpn service are you using - only a few them support forwarding.. And it has to be setup on their end, etc.

          If you sniffed that on the lan side - clearly pfsense forwarded the port, and the client never answered.. Local firewall prob blocking source other than is local network, etc.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • S
            sweden_cool @viragomann
            last edited by

            @viragomann said in Port Forwarding OVPN:

            For clarification, always mention on which device and which interface a packet capture was taken.
            Same with firewall rules.

            OpenVPN server and client configuration?
            What exactly are your trying to achieve?

            I've done this.

            https://www.ovpn.com/en https://www.ovpn.com/en/guides/pfsense

            persist-key
            persist-tun
            remote-cert-tls server
            key-direction 1
            reneg-sec 0
            

            Trying to make the gate open on the torrent.

            @johnpoz said in Port Forwarding OVPN:

            So your trying to forward traffic that hits your vpn server?

            Where exactly did you sniff that at? Does your vpn service/server even forward traffic? Which vpn service are you using - only a few them support forwarding.. And it has to be setup on their end, etc.

            If you sniffed that on the lan side - clearly pfsense forwarded the port, and the client never answered.. Local firewall prob blocking source other than is local network, etc.

            https://www.ovpn.com/en Yes it is true trying to forward traffic from my vpn to torrent and others.

            Lan

            12:13:47.204870 IP 198.199.98.246.40316 > 192.168.0.233.60720: tcp 0
            12:13:47.205267 IP 192.168.0.233.60720 > 198.199.98.246.40316: tcp 0
            12:13:48.202129 IP 192.168.0.233.60720 > 198.199.98.246.40316: tcp 0
            12:13:48.203805 IP 198.199.98.246.40324 > 192.168.0.233.60720: tcp 0
            12:13:48.203835 IP 198.199.98.246.40316 > 192.168.0.233.60720: tcp 0
            12:13:48.204107 IP 192.168.0.233.60720 > 198.199.98.246.40324: tcp 0
            12:13:48.204128 IP 192.168.0.233.60720 > 198.199.98.246.40316: tcp 0
            12:13:49.201891 IP 198.199.98.246.40324 > 192.168.0.233.60720: tcp 0
            12:13:49.202161 IP 192.168.0.233.60720 > 198.199.98.246.40324: tcp 0
            12:13:49.202279 IP 192.168.0.233.60720 > 198.199.98.246.40324: tcp 0
            12:13:49.206865 IP 198.199.98.246.40328 > 192.168.0.233.60720: tcp 0
            12:13:49.207181 IP 192.168.0.233.60720 > 198.199.98.246.40328: tcp 0
            12:13:50.202106 IP 192.168.0.233.60720 > 198.199.98.246.40316: tcp 0
            12:13:50.203466 IP 198.199.98.246.40328 > 192.168.0.233.60720: tcp 0
            12:13:50.203723 IP 192.168.0.233.60720 > 198.199.98.246.40328: tcp 0
            12:13:51.202227 IP 192.168.0.233.60720 > 198.199.98.246.40324: tcp 0
            12:13:51.202260 IP 192.168.0.233.60720 > 198.199.98.246.40328: tcp 0
            
            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              Well sure looks like your getting answer - most likely RST!

              Why don't you open that packet capture up in an say wireshark ant take a look see. Or have it give you more verbosity.. Would bet money those answers your 192.168.0.233 box is sending is RST... Or in other layman words - F Off!!

              It's going to be more informative to open the capture up in pfsense. But clearly pfsense sent traffic on to the .233 box.. So your forward worked.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              S 1 Reply Last reply Reply Quote 0
              • S
                sweden_cool @johnpoz
                last edited by

                @johnpoz said in Port Forwarding OVPN:

                Well sure looks like your getting answer - most likely RST!

                Why don't you open that packet capture up in an say wireshark ant take a look see. Or have it give you more verbosity.. Would bet money those answers your 192.168.0.233 box is sending is RST... Or in other layman words - F Off!!

                It's going to be more informative to open the capture up in pfsense. But clearly pfsense sent traffic on to the .233 box.. So your forward worked.

                13:37:28.851431 IP 198.199.98.246.32906 > 192.168.0.226.60720: tcp 0
                13:37:28.851947 IP 192.168.0.226.60720 > 198.199.98.246.32906: tcp 0
                13:37:29.848971 IP 198.199.98.246.32906 > 192.168.0.226.60720: tcp 0
                13:37:29.859111 IP 198.199.98.246.32908 > 192.168.0.226.60720: tcp 0
                13:37:29.859613 IP 192.168.0.226.60720 > 198.199.98.246.32908: tcp 0
                13:37:30.855759 IP 198.199.98.246.32908 > 192.168.0.226.60720: tcp 0
                13:37:30.858247 IP 198.199.98.246.32911 > 192.168.0.226.60720: tcp 0
                13:37:30.858606 IP 192.168.0.226.60720 > 198.199.98.246.32911: tcp 0
                13:37:31.852423 IP 192.168.0.226.60720 > 198.199.98.246.32906: tcp 0
                13:37:31.857319 IP 198.199.98.246.32911 > 192.168.0.226.60720: tcp 0
                13:37:32.853667 IP 192.168.0.226.60720 > 198.199.98.246.32908: tcp 0
                13:37:33.855741 IP 192.168.0.226.60720 > 198.199.98.246.32911: tcp 0
                

                0_1545914186245_analyze.png

                Come on, I had changed the ip address of my other server to see if it works there but now I have changed the ip address of 192.168.0.226 to other server running iperf3.

                At yougetsignal.com it still says that the gate is closed.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Well looks like your server is sending syn,ack back.. But doesn't seem to be getting back to the sender of the syn.

                  Sniff on the openvpn interface - do you see the syn,ack going back up the tunnel.. If so then its on your vpn.. Need to make sure the syn,ack is not going back out the normal wan vs the vpn tunnel.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    sweden_cool @johnpoz
                    last edited by sweden_cool

                    @johnpoz said in Port Forwarding OVPN:

                    Well looks like your server is sending syn,ack back.. But doesn't seem to be getting back to the sender of the syn.

                    Sniff on the openvpn interface - do you see the syn,ack going back up the tunnel.. If so then its on your vpn.. Need to make sure the syn,ack is not going back out the normal wan vs the vpn tunnel.

                    Interface OVPN_VPN

                    14:03:27.864349 IP 198.199.98.246.39458 > 10.128.56.178.60720: tcp 0
                    14:03:28.861481 IP 198.199.98.246.39458 > 10.128.56.178.60720: tcp 0
                    14:03:28.862139 IP 198.199.98.246.39465 > 10.128.56.178.60720: tcp 0
                    14:03:29.862138 IP 198.199.98.246.39465 > 10.128.56.178.60720: tcp 0
                    14:03:29.868060 IP 198.199.98.246.39471 > 10.128.56.178.60720: tcp 0
                    14:03:30.866820 IP 198.199.98.246.39471 > 10.128.56.178.60720: tcp 0
                    

                    0_1545915873040_Rules Lan.PNG

                    So it receives packages but sends it back in LAN instead of VPN if I get it right?

                    Edit:

                    WAN

                    14:40:08.600178 IP 10.128.56.178.60720 > 198.199.98.246.49340: tcp 0
                    14:40:09.611224 IP 10.128.56.178.60720 > 198.199.98.246.49345: tcp 0
                    14:40:10.614437 IP 10.128.56.178.60720 > 198.199.98.246.49350: tcp 0
                    14:40:11.609323 IP 10.128.56.178.60720 > 198.199.98.246.49340: tcp 0
                    14:40:12.604408 IP 10.128.56.178.60720 > 198.199.98.246.49345: tcp 0
                    14:40:13.625117 IP 10.128.56.178.60720 > 198.199.98.246.49350: tcp 0
                    
                    1 Reply Last reply Reply Quote 0
                    • K
                      kroem
                      last edited by

                      Seems to be the same problem I had, the return traffic is going out over WAN and not over the VPN tunnel. You should not see that traffic on the WAN interface, you should see UDP packets over port 1194.

                      I guess you'll need to do source based routing to make this traffic return over the vpn tunnel also.

                      Check so you have no rules in the openvpn tab on firewall, could be it because it will look at those rules first.

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        marvosa @kroem
                        last edited by marvosa

                        @kroem said in Port Forwarding OVPN:

                        Seems to be the same problem I had, the return traffic is going out over WAN and not over the VPN tunnel. You should not see that traffic on the WAN interface, you should see UDP packets over port 1194.
                        I guess you'll need to do source based routing to make this traffic return over the vpn tunnel also.
                        Check so you have no rules in the openvpn tab on firewall, could be it because it will look at those rules first.

                        Agreed. You'll want to verify several things:

                        • Verify the port is forwarded on the front end (according to your rules, it looks to be either PIA or OVPN). Since traffic appears to be making it to your firewall, we can presume this is done, but I always check regardless.

                        • Verify traffic sourced from the host's IP is routed down the tunnel via policy routing. If we assume your host's IP is part of the "pia_redirect_group" alias then we're good here also, but I would double check to be sure.

                        • Verify there is an outbound NAT for traffic sourced from your host's IP (or subnet) on the PIA/OVPN interface

                        • Verify your port forwards are configured on the correct interface and have the correct destination (PIA/OVPN interface and destination)

                        • Verify traffic is not being matched on the wrong interface. In other words, the rules on your OpenVPN tab should be explicit and not the default any/any. In other words, any rules on the OpenVPN tab should have an explicit source and destination or traffic will get sent out the wrong interface and will break port forwarding

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          @sweden_cool said in Port Forwarding OVPN:

                          14:40:08.600178 IP 10.128.56.178.60720 > 198.199.98.246.49340: tcp 0

                          So that is going out your WAN... Yeah that never going to work..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            The incoming traffic MUST NOT match rules on your OpenVPN tab.

                            The incoming traffic MUST match rules on your assigned interface tab.

                            You showed the rules on OVPN_VPN but not OpenVPN. If the traffic matches on the OpenVPN tab you WILL NOT get reply-to on the states and reply traffic will route according to the routing table, which likely means it will go out to the default gateway on WAN.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • K
                              kroem
                              last edited by

                              Ok, I fired up a new OVPN connection and got this working ( I got stuck about a year ago and decided to just move all VPN "protected" hosts under another virtual FW ). Not sure where I failed earlier.

                              Anyways. This works, the test interfaces I used where "LAN" and "VPN_OVPN_US"

                              fw-rules needed:
                              one pass rule on your LAN interface matching the hosts you want to use VPN, and set OVPN_INTERFACE_VPNV4 (or something) as gateway. Make sure this rule is matched before a "allow any out on LAN" rule for instance, otherwise it will not even be looked at. (i.e. but this rule at the top...)
                              Something like this works ( I just had one source for my test 10.1.1.199)

                                 Protocol 	   Source 	        Port 	Destination 	Port     Gateway 
                                 IPv4 * 	   10.1.1.199 	        *       * 	        * 	 VPN_OVPN_US_VPNV4 
                              

                              one pass rule created by your port forwarding rule, to match any traffic on VPN_OVPN_US interface and allow traffic to the port forwarded host and port. ie:

                              Protocol 	               Source 	Port 	Destination 	Port 	Gateway 	 	
                              IPv4 TCP/UDP 	* 	        * 	        10.1.1.199 	59362 	* 	
                              

                              NAT rules needed:

                              You need to have the port forwarding rule, which created the fw-rule above

                              Interface 	Protocol 	Source Address 	Source Ports 	Dest. Address 	Dest. Ports 	NAT IP 	NAT Ports
                              VPN_OVPN_US 	TCP/UDP 	* 	* 	VPN_OVPN_US address 	59362 	10.1.1.199 	59362 	
                              

                              And you need to have an outbound NAT (use Manual Outbound NAT rule generation) rule to translate the traffic back over the VPN tunnel:

                              	Interface 	Source 	 Source Port 	Destination 	Destination Port 	NAT Address 	 
                              	VPN_OVPN_US 	10.1.1.199/32 	* 	* 	* 	VPN_OVPN_US address 	* 		
                              

                              This works for me just to get routing working, then you might need to secure it etc, but routing works when I start a iperf server and connect to it from Internet.

                              Try it out ...

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                sweden_cool @kroem
                                last edited by

                                @kroem said in Port Forwarding OVPN:

                                Ok, I fired up a new OVPN connection and got this working ( I got stuck about a year ago and decided to just move all VPN "protected" hosts under another virtual FW ). Not sure where I failed earlier.

                                Anyways. This works, the test interfaces I used where "LAN" and "VPN_OVPN_US"

                                fw-rules needed:
                                one pass rule on your LAN interface matching the hosts you want to use VPN, and set OVPN_INTERFACE_VPNV4 (or something) as gateway. Make sure this rule is matched before a "allow any out on LAN" rule for instance, otherwise it will not even be looked at. (i.e. but this rule at the top...)
                                Something like this works ( I just had one source for my test 10.1.1.199)

                                   Protocol 	   Source 	        Port 	Destination 	Port     Gateway 
                                   IPv4 * 	   10.1.1.199 	        *       * 	        * 	 VPN_OVPN_US_VPNV4 
                                

                                one pass rule created by your port forwarding rule, to match any traffic on VPN_OVPN_US interface and allow traffic to the port forwarded host and port. ie:

                                Protocol Source Port Destination Port Gateway
                                IPv4 TCP/UDP * * 10.1.1.199 59362 *

                                NAT rules needed:

                                You need to have the port forwarding rule, which created the fw-rule above

                                Interface Protocol Source Address Source Ports Dest. Address Dest. Ports NAT IP NAT Ports
                                VPN_OVPN_US TCP/UDP * * VPN_OVPN_US address 59362 10.1.1.199 59362

                                And you need to have an outbound NAT (use Manual Outbound NAT rule generation) rule to translate the traffic back over the VPN tunnel:

                                  Interface 	Source 	 Source Port 	Destination 	Destination Port 	NAT Address 	 
                                  VPN_OVPN_US 	10.1.1.199/32 	* 	* 	* 	VPN_OVPN_US address 	* 		
                                

                                This works for me just to get routing working, then you might need to secure it etc, but routing works when I start a iperf server and connect to it from Internet.

                                Try it out ...

                                0_1546187776402_NAT how.PNG

                                Do you need everyone or can you remove two of them?

                                K 1 Reply Last reply Reply Quote 0
                                • K
                                  kroem @sweden_cool
                                  last edited by

                                  @sweden_cool said in Port Forwarding OVPN:

                                  0_1546187776402_NAT how.PNG

                                  Do you need everyone or can you remove two of them?

                                  You can remove the ISAKMP one. I'm not sure about the "pia group" one, but I guess that's from some tutorial ? Remove it or disable it. Keep it clean.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.