• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Asymmetric routing with multi WAN and OpenVPN

Scheduled Pinned Locked Moved Routing and Multi WAN
23 Posts 4 Posters 1.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V
    viragomann @jc2it
    last edited by Dec 9, 2022, 4:33 PM

    @jc2it said in Asymmetric routing with multi WAN and OpenVPN:

    Regardless by stating the specific gateway on a rule associated with an interface it is merely redundant.

    What do you think is redundant here?

    Stating a gateway in a pass rule forces any matching packet to this gateway. So this is quite nonsense for incoming packets to me.
    And I'm pretty surprised that your VPN server even works with that.

    Logically, it should not cause the default gateway to be used instead.

    I cannot imagine, what it effects exactly, but it want not have any advantage for sure. So I would set the gateway to "none" again.

    J 1 Reply Last reply Dec 9, 2022, 4:45 PM Reply Quote 0
    • J
      jc2it @viragomann
      last edited by Dec 9, 2022, 4:45 PM

      @viragomann

      @viragomann said:

      What do you think is redundant here?

      The default behavior is to have a NAT "reply to" associated with incoming rules. This should use the gateway that is associated with the interface the packet arrived in at. Explicitly specifying the gateway should remove any "confusion" as to which gateway to use.

      @viragomann said:

      I would set the gateway to "none" again.
      There is no "none" option. There are only a list of gateways, one of which is the default gateway. Which is where we don't want the packets "reply-to" in our Multi-WAN environment.

      Just so you know when we were experiencing the issue yesterday. changing this policy-based rule setting to "default" had zero effect, so I changed it back to what made logical sense given the issue we were experiencing.

      J V 2 Replies Last reply Dec 9, 2022, 4:51 PM Reply Quote 0
      • J
        jc2it @jc2it
        last edited by jc2it Dec 9, 2022, 5:13 PM Dec 9, 2022, 4:51 PM

        @jc2it @viragomann @mrsunfire

        After writing my last reply I recalled something I saw in the firewall System log yesterday but didn't find any answers to. Perhaps this is related to the issue where the OpenVPN packets are leaving from the default gateway instead of the gateway they arrived from.

        Dec 8 14:38:25 	php-fpm 	50688 	/rc.filter_configure_sync: Not installing NAT reflection rules for a port range > 500 
        

        @mrsunfire Do you have this message in your "Status/System Logs/System/General"

        M 1 Reply Last reply Dec 9, 2022, 6:53 PM Reply Quote 0
        • V
          viragomann @jc2it
          last edited by Dec 9, 2022, 4:53 PM

          @jc2it said in Asymmetric routing with multi WAN and OpenVPN:

          The default behavior is to have a NAT "reply to" associated with incoming rules. This should use the gateway that is associated with the interface the packet arrived in at. Explicitly specifying the gateway should remove any "confusion" as to which gateway to use.

          The rule won't affect any respond packets at all, but incoming packets only. Responses are treated automatically by pfSense.
          And direct any incoming packets back the the gateway might not be what you want.

          J 1 Reply Last reply Dec 9, 2022, 5:10 PM Reply Quote 0
          • J
            jc2it @viragomann
            last edited by Dec 9, 2022, 5:10 PM

            @viragomann

            @viragomann said:

            And direct any incoming packets back the the gateway might not be what you want.

            You make a good point. However, I definitely don't want them leaving via the default gateway or any other gateway in the list, which is the other option. Perhaps recreating the rule without the option, is the way to change it. Setting it to "default" didn't work yesterday.

            1 Reply Last reply Reply Quote 0
            • V
              viragomann
              last edited by Dec 9, 2022, 5:22 PM

              @jc2it
              The requirements for passing responses back out to the interface, where the requests were coming in are

              • a gateway must be assigned to the interface. Verify Status > Interfaces
              • the gateway state must be "online". Verify Status > Gateways
              • the pass rule, which allows the incoming access must be defined on the interface, because only such rules add the reply-to tag to the connection.
                Consider that floating and interface group rules are probed first.

              If all these are given it should work.

              J 1 Reply Last reply Dec 9, 2022, 6:23 PM Reply Quote 0
              • J
                jc2it
                last edited by Dec 9, 2022, 6:12 PM

                @jc2it said in Asymmetric routing with multi WAN and OpenVPN:

                @jc2it @viragomann @mrsunfire

                After writing my last reply I recalled something I saw in the firewall System log yesterday but didn't find any answers to. Perhaps this is related to the issue where the OpenVPN packets are leaving from the default gateway instead of the gateway they arrived from.

                Dec 8 14:38:25 	php-fpm 	50688 	/rc.filter_configure_sync: Not installing NAT reflection rules for a port range > 500 
                

                @mrsunfire Do you have this message in your "Status/System Logs/System/General"

                I found the source of this message. Back on November 4th we had changed a NAT rule from Pure NAT to NAT+Proxy because FTP stopped working correctly. That issue is probably caused by the same thing that causes the issue with the OpenVPN routing problem. After changing it back to PureNAT I no longer get the message when the filter reloads.

                1 Reply Last reply Reply Quote 0
                • M
                  mrsunfire @viragomann
                  last edited by Dec 9, 2022, 6:21 PM

                  @viragomann said in Asymmetric routing with multi WAN and OpenVPN:

                  @mrsunfire
                  Did you state special MTU settings in the OpenVPN client config?

                  Not really. MTU 1500 (default) works fine for that connection (DOCSIS).

                  Netgate 6100 MAX

                  1 Reply Last reply Reply Quote 0
                  • J
                    jc2it @viragomann
                    last edited by Dec 9, 2022, 6:23 PM

                    @viragomann

                    We have verified those are all functioning and were functioning in our system yesterday. However overnight, early morning on the 8th, we had several severe drops to the WAN that is configured as the system default gateway. This resulted in a change to the firewall that "moved"/ "added" a ROUTE_GATEWAY entry to the OpenVPN log. It runs at service restart time and sets the OpenVPN service to the default gateway. The fix was to change the system default gateway to the other WAN and then adjust outbound LAN rules for the services using the previous WAN.

                    We did this to restore service after testing/troubleshooting for several hours yesterday morning.

                    Where can I find the configuration entry causing the ROUTE_GATEWAY command to run when OpenVPN restarts?

                    1 Reply Last reply Reply Quote 0
                    • M
                      mrsunfire @jc2it
                      last edited by Dec 9, 2022, 6:53 PM

                      @jc2it said in Asymmetric routing with multi WAN and OpenVPN:

                      Dec 8 14:38:25 	php-fpm 	50688 	/rc.filter_configure_sync: Not installing NAT reflection rules for a port range > 500 
                      

                      @mrsunfire Do you have this message in your "Status/System Logs/System/General"

                      No.

                      Netgate 6100 MAX

                      1 Reply Last reply Reply Quote 0
                      23 out of 23
                      • First post
                        23/23
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received