• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Windows Client to WinServer - Windows Built in VPN (GRE) - Only first connection works

Scheduled Pinned Locked Moved General pfSense Questions
4 Posts 2 Posters 571 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bingo600
    last edited by bingo600 Dec 18, 2020, 1:34 PM Dec 18, 2020, 1:27 PM

    I have a strange issue (might be known) , think i see the issue described in the pfSense manual (GRE) issue.

    I have a hosted setup , where the implementor uses the Windows Server Built in VPN as connection method.

    This means i have used the Win10 Client built in VPN to access the service on the server. Aka ... Start the Win VPN , then start the Client program , and make tests. This is done for 3 clients at the same time.

    This is a VoIP service , and i need at least 3 clients to be able to test our functionality.

    2 clients in a call , and when the 3'rd dials one of the other , you should hear a "knock/Incomming-call" in the headset.

    This has worked wo. issues when the Client Vlan used had def-gw on our Cisco ASA.

    Now i have migrated that Vlan to our pfSense firewall , and i was just informed that : "IT DOESN'T WORK" .....

    Well the error report is "correct" ....
    The first Win10 Client VPN always succeds in connecting to the Win10-Server VPN. The next client doesn't.

    All 3 clients can connect provided they are "the first & only".

    On the server i see a message "from memory" ....
    Windows sees a connection , but "blab...blah" .... This is usually if the remote end doesn't permit GRE ... "Blah..Blah".

    If i take one of the PC's and move to my Test-pfSense , i can again connect the first PC , and now i can make a call between the Client on the Prod-Pfsense to the Test-pfSense. Indicating that the server and app works.

    I dug a little into the pfSense doc , and i'm quite sure i saw something about pf having issues with NAT & GRE for more than 1 connection. This seems to be consistent with my experience.
    Solution to use one public IP per connection 🤕

    1:
    Can anyone confirm that the above pf limit is correct ?

    2:
    Does anyone have a "better workaround" than multi public ip's ?
    Or do i have to put my Cisco ASA in production again , and make a "Win-VPN VLAN" that has def-gw via the ASA , as the ASA handles Multi Clients wo. probs. ??

    PS: Changing the server VPN away from the M$ C..p is unfortunately not an option.

    Tips/Hints are welcome.

    /Bingo

    If you find my answer useful - Please give the post a 👍 - "thumbs up"

    pfSense+ 23.05.1 (ZFS)

    QOTOM-Q355G4 Quad Lan.
    CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
    LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

    1 Reply Last reply Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by Dec 18, 2020, 5:34 PM

      Yeah sounds like you're hitting a state limit in pf.
      GRE has no concept of ports so the state on WAN is simply the WAN IP to the destination IP for protocol GRE. That's a problem if more than one client behind the firewall want to access the same remote server.

      But that is almost never an issue since PPTP is thankfully almost never used anymore.
      https://docs.netgate.com/pfsense/en/latest/nat/compatibility.html#pptp-gre

      Are they really still using that in Win10? in 2020?

      Steve

      1 Reply Last reply Reply Quote 0
      • B
        bingo600
        last edited by Dec 19, 2020, 12:33 PM

        Thanx Steve

        I guess it's back to putting the ASA in production again.

        /Bingo

        If you find my answer useful - Please give the post a 👍 - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

        1 Reply Last reply Reply Quote 0
        • S
          stephenw10 Netgate Administrator
          last edited by Dec 19, 2020, 12:45 PM

          Maybe no choice if they are really using PPTP still.

          If they are using GRE over IPSec which I would expect to find more commonly it implies they might not be encrypting it correctly.

          Steve

          1 Reply Last reply Reply Quote 0
          2 out of 4
          • First post
            2/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received