Ich würde mal ausprobieren, welche IP hinter "versatel.sip" steht. Du sagst, das Gateway dort ist die 172.16.1.1, welche IP bekommt die OpnSense denn auf pppoe1 zugewiesen? Es kann sein, dass Du noch eine Route auf das 10er Netz von Versatel über das Gateway 172.16.1.1 einrichten musst, damit Du z.B. versatel.sip oder 10.0.0.4 aus Deinen Netzen erreichen kannst - wohlgemerkt: auf der OpnSense!
Interface Time Source Destination Proto Label WAN_INT 2024-01-15T21:36:49 92.206.XX.XX:49044 10.0.0.4:5060 udp let out anything from firewall host itself (force gw)
src=169.254.1.1dst=169.254.1.1dst=192.168.1.101src=192.168.1.101src=10.0.0.4dst=10.0.0.4srcport=5060dstport=5060
Interface Time Source Destination Proto Label WAN_INT 2024-01-16T08:11:42 192.168.1.5:5060 10.0.0.4:5060 udp let out anything from firewall host itself
Interface Time Source Destination Proto Label ▷ WAN_INT 2024-01-17T22:01:04 172.16.XXX.XXX:5060 10.0.0.4:5060 udp let out anything from firewall host itself (force gw) ↔ WAN_INT 2024-01-17T22:01:04 192.168.1.5:5060 10.0.0.4:5060 udp nat rule
Interface Time Source Destination Proto Label 🛇 WAN_VoIP 2024-01-17T21:26:59 10.0.0.4:12992 172.16.XXX.XXX:7078 udp Default deny / state violation rule▷ WAN_INT 2024-01-17T21:26:47 203.23.107.15:57036 10.0.0.4:12993 udp let out anything from firewall host itself (force gw)🛇 WAN_VoIP 2024-01-17T21:26:35 10.0.0.4:12992 172.16.XXX.XXX:7078 udp Default deny / state violation rule ▷ WAN_INT 2024-01-17T21:26:35 203.23.107.15:57631 10.0.0.4:12992 udp let out anything from firewall host itself (force gw) 🛇 WAN_VoIP 2024-01-17T21:26:35 10.0.0.4:12992 172.16.XXX.XXX:7078 udp Default deny / state violation rule 🛇 WAN_VoIP 2024-01-17T21:26:35 10.0.0.4:12992 172.16.XXX.XXX:7078 udp Default deny / state violation rule 🛇 WAN_VoIP 2024-01-17T21:26:35 10.0.0.4:12992 172.16.XXX.XXX:7078 udp Default deny / state violation rule 🛇 WAN_VoIP 2024-01-17T21:26:35 10.0.0.4:12992 172.16.XXX.XXX:7078 udp Default deny / state violation rule ▷ WAN_INT 2024-01-17T21:25:34 172.16.XXX.XXX:5060 10.0.0.4:5060 udp let out anything from firewall host itself (force gw) ↔ WAN_INT 2024-01-17T21:25:34 192.168.1.5:5060 10.0.0.4:5060 udp nat rule
Interface Time Source Destination Proto Label LAN > 2024-01-24T22:07:45 192.168.1.5:53805 255.255.255.255:53805 udp Allow access to Internet and block access to all local networks WAN_VoIP < 2024-01-24T22:06:49 172.16.XXX.XXX:2281 10.0.0.4:5060 udp let out anything from firewall host itself (force gw) LAN > 2024-01-24T22:06:49 192.168.1.5:5060 10.0.0.4:5060 udp [VoIP] Allow access from Fritzbox to SIP proxy
Interface Time Source Destination Proto Label WAN_VoIP > 2024-01-24T21:16:16 10.0.0.4:5060 172.16.XXX.XXX:5060 udp Default deny / state violation rule WAN_VoIP > 2024-01-24T21:16:01 10.0.0.4:5060 172.16.XXX.XXX:5060 udp Default deny / state violation rule WAN_VoIP > 2024-01-24T21:15:53 10.0.0.4:5060 172.16.XXX.XXX:5060 udp Default deny / state violation rule