<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Routing established TCP connection through PFsense and OpenVPN]]></title><description><![CDATA[<p dir="auto">Hi,</p>
<p dir="auto">I am trying to configure PFsense with OpenVPN as follows.</p>
<p dir="auto"><img src="/assets/uploads/files/1687168479892-pfsense_config.png" alt="pfsense_config.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">In this configuration, I have two links between server and client. Link 1 is used for forward traffic only (server to client), and Link 2 can be used for forward, and always for return traffic.<br />
Link 2 deploys an OpenVPN between two PFsense machines.</p>
<p dir="auto">The switch uses openswitch to send packets on link 1 or 2. I have four main scenarios, with TCP traffic:</p>
<ul>
<li>Case 1: Send all packets on Link 1</li>
<li>Case 2: Send all packets on Link 2</li>
<li>Case 3: Send all packets on Link 1, then switch to Link 2 after X seconds</li>
<li>Case 4: Send all packets on Link 2, then switch to Link 1 after X seconds</li>
</ul>
<p dir="auto">In any case, return traffic, from client to server, uses Link 2.</p>
<p dir="auto">Cases 1 and 2 work fine. I just had to increase the "TCP start timeout" to avoid firewall blocking packets after 30s in the PFsense client.</p>
<p dir="auto">However, with Case 3, as soon as I switch forward traffic to Link 1 after X seconds, the TCP acks on Link 2 are blocked and never received by the server. I tried to change some advanced parameters in the PFsense configuration, but I did not manage to make it work.<br />
For Case 4, I will investigate further once Case 3 is solved.</p>
<p dir="auto">Do you have any thoughts on what I can do to allow TCP acks on Link 2 ?</p>
<p dir="auto">Thanks</p>
]]></description><link>https://forum.netgate.com/topic/180924/routing-established-tcp-connection-through-pfsense-and-openvpn</link><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 12:02:57 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/180924.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 19 Jun 2023 10:03:58 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Routing established TCP connection through PFsense and OpenVPN on Mon, 19 Jun 2023 17:37:24 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/bemethor">@<bdi>bemethor</bdi></a><br />
Not really clear, what's the benefit of the link switching at all.</p>
<p dir="auto">pfSense is a stateful firewall. It requires to see the SYN packet of a TCP connection to pass the following packets.</p>
<p dir="auto">You can close the connection, when switching to the other link, so the client has to establish a new one. But this has to be done on the the openswitch. And it has the drawback that it slows down the communication.</p>
<p dir="auto">Alternatively you can circumvent the blocking of out of state packets on pfSense by adding a sloppy state rule to allow response packets without an existing state.<br />
But this could be a security impact. So you should at least restrict it to the certain source and destination.</p>
<p dir="auto">Since you intend to switch the connection in both directions you will need such rule on both nodes.</p>
]]></description><link>https://forum.netgate.com/post/1111261</link><guid isPermaLink="true">https://forum.netgate.com/post/1111261</guid><dc:creator><![CDATA[viragomann]]></dc:creator><pubDate>Mon, 19 Jun 2023 17:37:24 GMT</pubDate></item></channel></rss>