• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Routing/INterface/Gateway issues after updating from CE 2.7 -> 2.71

Scheduled Pinned Locked Moved General pfSense Questions
23 Posts 3 Posters 2.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    grillp @grillp
    last edited by grillp Nov 22, 2023, 2:42 AM Nov 22, 2023, 2:39 AM

    A little more info.. I had a look at the active rules and see these rules taht correspond to the rule above:

    pass in quick on vmx1 inet proto tcp from <THRU_VPN> to any flags S/SA keep state label "USER_RULE: THRU_SYD Addresses" label "id:1618222021" label "gw:VPN_SYD_VPNV4" ridentifier 1618222021 tag NO_WAN_EGRESS
    pass in quick on vmx1 inet proto udp from <THRU_VPN> to any keep state label "USER_RULE: THRU_SYD Addresses" label "id:1618222021" label "gw:VPN_SYD_VPNV4" ridentifier 1618222021 tag NO_WAN_EGRESS\
    

    and it sees like the $GWVPN_SYD_VPNV4 had not been resolved to point to a the vpn gateway!

    I checked simmilar rules that use $GWVPN_CLIENT or $GWWAN_PPPOE as defined above like:

    pass  out  quick  on {  pppoe0  }  $GWWAN_PPPOE inet from <MY-INTERNET-IP> to any ridentifier 1665212341 keep state  dnqueue( 2,1) label "USER_RULE: CoDel Limiters" label "id:1665212341" label "gw:WAN_PPPOE"
    

    and the actual that is active shows:

    pass out quick on pppoe0 route-to (pppoe0 <MY-ISP-INTERNAL-IP>) inet from <MY-INTERNET-IP> to any flags S/SA keep state label "USER_RULE: CoDel Limiters" label "id:1665212341" label "gw:WAN_PPPOE" ridentifier 1665212341 dnqueue(2, 1)
    

    So it does get resolved in that rule, but not in my VPN routing rule!

    So something in some definition of Gateways in my configuration (or stored in some config DB) seems to be borked.

    Strangeness continues!

    D 1 Reply Last reply Nov 22, 2023, 12:54 PM Reply Quote 1
    • D
      digdug3 @grillp
      last edited by Nov 22, 2023, 12:54 PM

      @grillp I have exactly the same issue. Since 2.7.1 the routing over an OpenVPN client does not work.
      I have exactly the same rules as you. Using PIA as VPN provider.

      Does your THRU_NL network is on another subnet as your main LAN? Or is it in a seperate VLAN?

      Looks like I -can- route and ping from my LAN to the VPN gateway, but not from the seperate VLAN subnet to the VPN gateway.
      I do however can ping the VPN gateway from the VLAN subnet, but not 8.8.8.8.

      1 Reply Last reply Reply Quote 0
      • S
        stephenw10 Netgate Administrator
        last edited by Nov 22, 2023, 1:16 PM

        A VPN gateway like that is dynamic so you would expect to see it empty like that before the VPN connects. But as soon as it connects it should regenerate the rules to include that.
        That only happens for an assigned interface.
        Did the interface or gateway get renamed?

        Try running Status > Filter Reload and then rechecking.

        1 Reply Last reply Reply Quote 0
        • D
          digdug3
          last edited by Nov 22, 2023, 2:40 PM

          I did some other tests. Looks like routing to VPN gateway from the default LAN is working.
          Routing to the VPN gateway from another subnet or VLAN is not.

          All firewall rules are still the same as they were upgrading from 2.6.0 to 2.7.0 and started after upgrading to 2.7.1

          Status > Filter Reload did not help, interface and gateway still have the same name. Nothing has changed since 2.6.0

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by stephenw10 Nov 22, 2023, 2:49 PM Nov 22, 2023, 2:45 PM

            Ok check the rulset file in /tmp/rules.debug.

            Do you have the VPN gateway populated?

            Is that also added to the policy routing rules on LAN? On other internal interfaces?

            Trying to replicate this here now.

            D 3 Replies Last reply Nov 22, 2023, 3:09 PM Reply Quote 0
            • D
              digdug3 @stephenw10
              last edited by Nov 22, 2023, 3:09 PM

              @stephenw10 Yes, it is populated.

              GWPRIVATEVPN_VPNV4 = " route-to ( ovpnc2 10.32.x.x ) "
              nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535  # VLANVPN to PRIVATEVPN
              pass  in  quick  on $VLANVPN  $GWPRIVATEVPN_VPNV4 inet proto { tcp udp }  from $OPT12__NETWORK to any ridentifier 1496691583 keep state label "USER_RULE: VLANVPN to PRIVATEVPN outgoing ports IP4 TCP/UDP" label "id:1496691583" label "gw:PRIVATEVPN_VPNV4"
              pass  in  quick  on $VLANVPN  $GWPRIVATEVPN_VPNV4 inet proto icmp  from $OPT12__NETWORK to any icmp-type echoreq ridentifier 1502282393 keep state label "USER_RULE: VLANVPN to PRIVATEVPN outgoing ports ICMP" label "id:1502282393" label "gw:PRIVATEVPN_VPNV4"
              
              
              1 Reply Last reply Reply Quote 0
              • D
                digdug3 @stephenw10
                last edited by digdug3 Nov 22, 2023, 3:13 PM Nov 22, 2023, 3:12 PM

                @stephenw10 And for the LAN

                nat on $PRIVATEVPN inet from 192.168.1.0/24 to any -> 10.32.x.x/32 port 1024:65535  # LAN to PRIVATEVPN
                pass  in  quick  on $LAN  $GWPRIVATEVPN_VPNV4 inet from $VPNClients to any ridentifier 1422085516 keep state label "USER_RULE: LAN to PRIVATEVPN outgoing ports IP4" label "id:1422085516" label "gw:PRIVATEVPN_VPNV4"
                
                1 Reply Last reply Reply Quote 0
                • D
                  digdug3 @stephenw10
                  last edited by Nov 22, 2023, 3:20 PM

                  @stephenw10 Did see the difference between the LAN and VLAN rule. Then changed TCP/UDP in the VPN VLAN rule to * and it looks like it's working now, also from a subnet.
                  Why?

                  D 1 Reply Last reply Nov 22, 2023, 4:07 PM Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Nov 22, 2023, 4:05 PM

                    How are you testing?

                    1 Reply Last reply Reply Quote 0
                    • D
                      digdug3 @digdug3
                      last edited by digdug3 Nov 22, 2023, 4:08 PM Nov 22, 2023, 4:07 PM

                      @digdug3 said in Routing/INterface/Gateway issues after updating from CE 2.7 -> 2.71:

                      @stephenw10 Did see the difference between the LAN and VLAN rule. Then changed TCP/UDP in the VPN VLAN rule to * and it looks like it's working now, also from a subnet.
                      Why?

                      No looks like it does not work again. Probably due to a reload.
                      Saw another post about the NAT rules. I did have a disabled OPT1, the nat rule was directly after it:

                      scrub on $PRIVATEVPN2 inet6 all    fragment reassemble
                      # Missing interface 'opt1' for rule 'LAN to OPT1'nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535  # VLANVPN to PRIVATEVPN
                      nat on $PRIVATEVPN inet from 192.168.1.0/24 to any -> 10.32.x.x/32 port 1024:65535  # LAN to PRIVATEVPN
                      

                      Totally removed the interface, also from hybrid NAT generated rules and the VPN works again...
                      Now the debug looks like:

                      scrub on $PRIVATEVPN2 inet6 all    fragment reassemble
                      nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535  # VLANVPN to PRIVATEVPN
                      nat on $PRIVATEVPN inet from 192.168.1.0/24 to any -> 10.32.x.x/32 port 1024:65535  # LAN to PRIVATEVPN
                      

                      And it works again.

                      1 Reply Last reply Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator
                        last edited by Nov 22, 2023, 4:11 PM

                        @digdug3 said in Routing/INterface/Gateway issues after updating from CE 2.7 -> 2.71:

                        Missing interface 'opt1' for rule 'LAN to OPT1'nat on $PRIVATEVPN inet from 192.168.14.0/24 to any -> 10.32.x.x/32 port 1024:65535 # VLANVPN to PRIVATEVPN

                        Aha, looks like a missing /n somewhere. Hmmm

                        1 Reply Last reply Reply Quote 0
                        • S
                          stephenw10 Netgate Administrator
                          last edited by Nov 22, 2023, 4:14 PM

                          Did you have outbound NAT in manual mode? In hybrid mode the auto rules should still have translated that.

                          D 1 Reply Last reply Nov 22, 2023, 5:38 PM Reply Quote 0
                          • S
                            stephenw10 Netgate Administrator
                            last edited by Nov 22, 2023, 4:26 PM

                            Added a bug to track: https://redmine.pfsense.org/issues/15024

                            1 Reply Last reply Reply Quote 1
                            • D
                              digdug3 @stephenw10
                              last edited by Nov 22, 2023, 5:38 PM

                              @stephenw10 I've always had them in "Hybrid Outbound NAT" mode.

                              1 Reply Last reply Reply Quote 0
                              • S
                                stephenw10 Netgate Administrator
                                last edited by Nov 22, 2023, 5:47 PM

                                Hmm, then I would have expected the auto rules to apply that translation even if the manual rule you added was not being applied.

                                Do you see an equivalent rule in the listed out OBN rules?

                                D 1 Reply Last reply Nov 22, 2023, 6:53 PM Reply Quote 0
                                • D
                                  digdug3 @stephenw10
                                  last edited by digdug3 Nov 22, 2023, 6:55 PM Nov 22, 2023, 6:53 PM

                                  @stephenw10 Just checked the OBN rules again and the VPN nat rule was added manually (years ago):
                                  obn.png
                                  No other rules were commented out.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    stephenw10 Netgate Administrator
                                    last edited by Nov 22, 2023, 7:16 PM

                                    If it's in hybrid mode though you should also have auto rules added for the VLANVPN subnet on the PrivateVPN interface. They should be shown below the manual rules.

                                    D 1 Reply Last reply Nov 23, 2023, 7:34 AM Reply Quote 0
                                    • D
                                      digdug3 @stephenw10
                                      last edited by Nov 23, 2023, 7:34 AM

                                      @stephenw10 No, they aren't, probably because the VPN client has "Don't pull routes" checked. I also only want these rules for two of my subnets, not all of them.

                                      Next "issue" I found was when deleting an interface the manual created OBN rule wasn't removed (just like the firewall rules). It should be easy to replicate.

                                      And last, the comment in the debug said "missing interface", shouldn't it be "disabled interface" when the interface is disabled?
                                      "missing" is more correct when the interface is deleted but the manual OBN rule is still there.

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        stephenw10 Netgate Administrator
                                        last edited by Nov 23, 2023, 1:07 PM

                                        The pf process doesn't see any difference between disabled or entirely removed interfaces. It just sees referenced to an interface that isn't defined.

                                        It is interesting that it's not removed like a firewall rule would be though.

                                        D 1 Reply Last reply Nov 23, 2023, 1:18 PM Reply Quote 0
                                        • D
                                          digdug3 @stephenw10
                                          last edited by Nov 23, 2023, 1:18 PM

                                          @stephenw10 At least it's fixed now for me and looks like the missing /n after the "missing interface" comment was the culprit.

                                          1 Reply Last reply Reply Quote 1
                                          23 out of 23
                                          • First post
                                            23/23
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received