Quote from: MeltdownSpectre on May 24, 2025, 03:51:22 PMYou can update safely. ISC is still very much there in 25.1.7.
I updated last night and nothing broke for me.
Thanks, this will give me some (more) time to look into the alternatives.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: MeltdownSpectre on May 24, 2025, 03:51:22 PMYou can update safely. ISC is still very much there in 25.1.7.
I updated last night and nothing broke for me.
Quote from: Rockyuk on September 16, 2024, 06:18:01 PMI experienced a problem with RTP failing due to packet size on releases newer than 24.7, something to do with how fragmentation is now being processed. As a workaround I had to edit the VoIP phone and remove enough codecs from its configuration to allow packets to go through. Perhaps your problem is related?
Ok, after digging a little deeper I did a packet capture on the Apps on my Android phone RTP & STUN are being blocked and some DNS queries on port 53.
~ $ ping -4 -c 1 -D -s 1472 www.google.com
ping: packet size too large: 1472 > 56: Operation not permitted
~ $ ping -6 -c 1 -D -s 1452 www.google.com
PING(1500=40+8+1452 bytes) 2001:XXXXXXXXXXX --> 2a00:1450:4009:81f::2004
1460 bytes from 2a00:1450:4009:81f::2004, icmp_seq=0 hlim=120 time=6.121 ms
--- www.google.com ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 6.121/6.121/6.121/0.000 ms
Quote from: FredFresh on September 07, 2024, 02:01:54 PM
Sorry, my mistake....the opnsense SHOULD see the public ip right? (didn't tried yet)...now the wan has a static ip4 ip, should i put PPPoE?
Quote from: FredFresh on September 07, 2024, 02:01:54 PMMy problem is that I have 3 vpn of the same provide implemented and working with a fall-back logic.
Quote from: meyergru on September 03, 2024, 03:56:46 PMPerhaps my reasoning was wrong, but I was thinking all that changed to cause the phones to stop calling out was the opensense firmware update. It could be the updates allowed for hidden errors in my configuration to show up, and/or perhaps something else was clashing with the latest firmware changes. As it happened it was an MTU issue causing fragmentation.
Up to this point, I still think that the outbound NAT rules are wrong one way or another. Maybe the DNS entries do not map to the suspected IPs, maybe it is even worse and he is behind CGNAT or other type of double NAT.
igb0: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1508
options=4802028<VLAN_MTU,JUMBO_MTU,WOL_MAGIC,HWSTATS,MEXTPG>
[snip ...]
pppoe0: flags=10088d1<UP,POINTOPOINT,RUNNING,NOARP,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1508
description: WAN (wan)
Source Destination NAT
Interface Proto Address Ports Address Ports IP Ports Description
WAN UDP SIP_IPv4 5060 (SIP) 123.45.6.789 5062 192.168.20.21 5062 SIP IPv4 redirect
WAN UDP SIP_IPv4 5060 (SIP) 123.45.6.789 5064 192.168.20.22 5064 SIP IPv4 redirect
Source Destination NAT
Interface Proto Address Ports Address Ports IP Ports Description
WAN UDP SIP_IPv4 * 123.45.6.789 5062 192.168.20.21 5062 SIP IPv4 redirect
WAN UDP SIP_IPv4 * 123.45.6.789 5064 192.168.20.22 5064 SIP IPv4 redirect
nat on pppoe0 inet proto udp from 192.168.20.21 to <SIP_IPv4> -> (pppoe0:0) static-port
nat on pppoe0 inet proto udp from 192.168.20.22 to <SIP_IPv4> -> (pppoe0:0) static-port
[snip ...]
rdr on pppoe0 inet proto udp from <SIP_IPv4> port = sip to 123.45.6.789 port = 5062 -> 192.168.20.21 port 5062
rdr on pppoe0 inet proto udp from <SIP_IPv4> port = sip to 123.45.6.789 port = 5064 -> 192.168.20.22 port 5064
rdr on pppoe0 inet proto udp from <RTP_IPv4> to 123.45.6.789 port 49252:49262 -> 192.168.20.21 port 49252:49262
rdr on pppoe0 inet proto udp from <RTP_IPv4> to 123.45.6.789 port 49272:49282 -> 192.168.20.22 port 49272:49282
Quote from: SideOfRanch on September 02, 2024, 12:31:04 AMJust to make it clear, the 24.7 and previous releases work OK in my use case, it's versions after 24.7 which partially broke VoIP here. Are you able to receive calls with "wifi calling", or does it not work at all?
I've had a similar issue with Verizon and outgoing calls over "wifi calling." I have yet to find any setting I can change to make it work, but this has persisted for a very long time and isn't new in 24.7 for me.
Quote from: meyergru on September 01, 2024, 11:35:56 PMSorry, I am not familiar with many opnsense configuration options - are you referring to the Outbound NAT option to enable a "static port"? I have not changed the Outbound NAT from 'auto'. I only have one IPv4 public address at this moment.
You did use "static port" for the connectiions?