Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - radderz

#1
I guess the main question here is, do I need a double appliance setup like I have with the PfSense or should this be a supported setup within OPNSense, I moved to OPNSense as it is a newer FreeBSD which is supposed to support NAT on traffic through a VTI tunnel.
#2
Here is a snip from the log, which shows the NAT worked as the internal device IP range of 10.0.32.0/19 traffic is trying to send data to 172.17.0.1:8021 and is showing up as blocked when Port Forwarded to 52.xxx.xx.xx:8021 so I think the port forwarding part is working.

However the routing or the firewall is blocking the traffic or the states are failing or something else is causing the connections to fail rapidly. Since the devices are on high latency connections and send their data quite slowly, the devices fail to keep up with their queued data in real time.
#3
I have a firewall hosted in Azure, and I have IoT device ingress traffic through VTI Tunnels using BGP for the routing.

The Port Forward rules are correctly showing as working, but the firewall is blocking some of the traffic with "Default Deny Rule". This could be either loss of states or an issue with the rules but even with an ANY ANY type rule (just for testing) the devices still show up as blocked on the firewall Log.

I have read a lot through the forums on this but everyone's issues appear different. The devices are on a IPSec tunnel with a total round trip ping time of around 300ms so it's quite high latency. We are seeing most of the traffic go through but the devices are definitely struggling to make and hold a connection.

We are trying to move to OPNSense from a pair of PfSense appliances splitting up the IPSec/BGP roles and the NAT role with the IPSec/BGP Role routing all the device traffic to the other appliance which then processes the NAT which works.