Project

General

Profile

Actions

Bug #3484

closed

IPv6 - the gateway address does not lie within one of the chosen interface's subnets

Added by Doktor Notor about 10 years ago. Updated about 10 years ago.

Status:
Resolved
Priority:
Normal
Assignee:
-
Category:
-
Target version:
Start date:
02/24/2014
Due date:
% Done:

100%

Estimated time:
Plus Target Version:
Release Notes:
Affected Version:
2.1-IPv6
Affected Architecture:

Description

2.1.1-PRERELEASE (i386) 
built on Sat Feb 22 04:06:07 EST 2014 
FreeBSD 8.3-RELEASE-p14

I am merely trying to change a description of a GW which is perfectly working and has been added about a week ago. The GW IP is 2001:470:xxxx:xx::1 and the interface (IPv6 tunnel) subnet is 2001:470:xxxx:xx::2/64 - cannot really see how's this not within the subnet. (P.S. The case is the same in both IPs, the only difference being ::1 vs ::2, so - not in any way related to the case-sensitive link-local stuff bug.)


Files

config.xml (20.6 KB) config.xml Doktor Notor, 03/05/2014 09:22 AM
Actions #1

Updated by Doktor Notor about 10 years ago

Afraid it's trying to compare the subnet to the "gif remote address" which is obviously IPv4. No wonder it fails. As said above, this used to work just a week ago, perfectly fine.

Actions #2

Updated by Ermal Luçi about 10 years ago

After investigation this seems to be an problem of INET6 implementation of FreeBSD.

It does not allow on gifv6 tunnels to install for point to point a mask other than 128.

Some test will be done to attempt to fix this.

The kernel check can be relaxed just need to be verified why the limitation.

Actions #3

Updated by Ermal Luçi about 10 years ago

  • Status changed from New to Feedback
  • % Done changed from 0 to 100
Actions #4

Updated by Ermal Luçi about 10 years ago

Actions #5

Updated by Doktor Notor about 10 years ago

OK, thanks for investigating. Please, let me know what should be done to test the fixes, kinda confused by the comments.

Actions #6

Updated by Ermal Luçi about 10 years ago

Ah just gitsync to latest code and set the assigned GIF interface to none on the Interfaces configuration screen and you will have a dynamic gateway created on the gateways screen.

No need to the configuration of the gateway manually.

Actions #7

Updated by Doktor Notor about 10 years ago

This totally messed up my IPv6 connectivity. Cannot even ping an IPv6 from the firewall due to some nonsense about buffer space.

ping6: sendmsg: No buffer space available

IPv6 unusable from LAN as well, even though I get IPv6 address via radvd.

Actions #8

Updated by Doktor Notor about 10 years ago

OK, back to static IPv6, manually created GW, everything working again. So, assigned GIF interface set to None definitely does not work at all. I also wonder, what's really the problem here, when it lets you create the gateway without any complaints, and then all of a sudden decides that it's outside of subnet when trying to change the description.

Actions #9

Updated by Renato Botelho about 10 years ago

I pushed more fixes today, please try tomorrow's snapshot or gitsync it to latest RELENG_2_1 and let me know the results. It's working fine on my test environment with interface IPv6 set to none and automatic created routing.

Actions #10

Updated by Doktor Notor about 10 years ago

Sorry, this does not work. GW autoconfigured, shows up (required a reboot to even get that far), the assigned tunnel interface shows up as well with proper IP, yet there absolutely no IPv6 connectivity, neither from the FW box, nor from LAN clients. (The WAN is PPPoE, in case it could be relevant.)

Actions #11

Updated by Doktor Notor about 10 years ago

And indeed, when I look at the routes, with the dynamic GW, it shows just complete nonsense.

Dynamic, non-working GW:

Destination                       Gateway                       Flags      Netif Expire
default                           fe80::230:88ff:fe04:9597%pppoe0 UGS      pppoe0

Manually created, working GW:

Destination                       Gateway                       Flags      Netif Expire
default                           2001:470:xx:yy::1             UGS        gif0

Actions #12

Updated by Renato Botelho about 10 years ago

Could you show your config.xml (without sensitive data)?

Actions #13

Updated by Doktor Notor about 10 years ago

The working one, or the broken one?

Actions #14

Updated by Renato Botelho about 10 years ago

Doktor Notor wrote:

The working one, or the broken one?

broken one

Actions #15

Updated by Doktor Notor about 10 years ago

OK, tried to nuke most of the irrelevant/sensitive info.

<?xml version="1.0"?>
<pfsense>
    <version>10.1</version>
    <lastchange/>
    <theme>pfsense_ng</theme>
    <sysctl>
        <item>
            <descr><![CDATA[Enable mounting the FS read only with more checks.]]></descr>
            <tunable>vfs.forcesync</tunable>
            <value>default</value>
        </item>
        <item>
            <tunable>debug.pfftpproxy</tunable>
            <value>default</value>
            <descr><![CDATA[Disable the pf ftp proxy handler.]]></descr>
        </item>
        <item>
            <descr><![CDATA[Increase UFS read-ahead speeds to match current state of hard drives and NCQ.]]></descr>
            <tunable>vfs.read_max</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Set the ephemeral port range to be lower.]]></descr>
            <tunable>net.inet.ip.portrange.first</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Drop packets to closed TCP ports without returning a RST]]></descr>
            <tunable>net.inet.tcp.blackhole</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Do not send ICMP port unreachable messages for closed UDP ports]]></descr>
            <tunable>net.inet.udp.blackhole</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Randomize the ID field in IP packets (default is 0: sequential IP IDs)]]></descr>
            <tunable>net.inet.ip.random_id</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)]]></descr>
            <tunable>net.inet.tcp.drop_synfin</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Enable sending IPv4 redirects]]></descr>
            <tunable>net.inet.ip.redirect</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Enable sending IPv6 redirects]]></descr>
            <tunable>net.inet6.ip6.redirect</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Enable privacy settings for IPv6 (RFC 4941)]]></descr>
            <tunable>net.inet6.ip6.use_tempaddr</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Prefer privacy addresses and use them over the normal addresses]]></descr>
            <tunable>net.inet6.ip6.prefer_tempaddr</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Generate SYN cookies for outbound SYN-ACK packets]]></descr>
            <tunable>net.inet.tcp.syncookies</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Maximum incoming/outgoing TCP datagram size (receive)]]></descr>
            <tunable>net.inet.tcp.recvspace</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Maximum incoming/outgoing TCP datagram size (send)]]></descr>
            <tunable>net.inet.tcp.sendspace</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[IP Fastforwarding]]></descr>
            <tunable>net.inet.ip.fastforwarding</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Do not delay ACK to try and piggyback it onto a data packet]]></descr>
            <tunable>net.inet.tcp.delayed_ack</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Maximum outgoing UDP datagram size]]></descr>
            <tunable>net.inet.udp.maxdgram</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Handling of non-IP packets which are not passed to pfil (see if_bridge(4))]]></descr>
            <tunable>net.link.bridge.pfil_onlyip</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Set to 0 to disable filtering on the incoming and outgoing member interfaces.]]></descr>
            <tunable>net.link.bridge.pfil_member</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Set to 1 to enable filtering on the bridge interface]]></descr>
            <tunable>net.link.bridge.pfil_bridge</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Allow unprivileged access to tap(4) device nodes]]></descr>
            <tunable>net.link.tap.user_open</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())]]></descr>
            <tunable>kern.randompid</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Maximum size of the IP input queue]]></descr>
            <tunable>net.inet.ip.intr_queue_maxlen</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Disable CTRL+ALT+Delete reboot from keyboard.]]></descr>
            <tunable>hw.syscons.kbd_reboot</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Enable TCP Inflight mode]]></descr>
            <tunable>net.inet.tcp.inflight.enable</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Enable TCP extended debugging]]></descr>
            <tunable>net.inet.tcp.log_debug</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Set ICMP Limits]]></descr>
            <tunable>net.inet.icmp.icmplim</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[TCP Offload Engine]]></descr>
            <tunable>net.inet.tcp.tso</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[UDP Checksums]]></descr>
            <tunable>net.inet.udp.checksum</tunable>
            <value>default</value>
        </item>
        <item>
            <descr><![CDATA[Maximum socket buffer size]]></descr>
            <tunable>kern.ipc.maxsockbuf</tunable>
            <value>default</value>
        </item>
    </sysctl>
    <system>
        <optimization>normal</optimization>
        <hostname>gw</hostname>
        <domain>testdomain.local</domain>
        <timezone>Europe/Prague</timezone>
        <time-update-interval/>
        <timeservers>192.168.0.151</timeservers>
        <webgui>
            <protocol>https</protocol>
            <ssl-certref>5228d97bef5af</ssl-certref>
            <port/>
            <max_procs>2</max_procs>
            <disablehttpredirect/>
            <nodnsrebindcheck/>
            <beast_protection/>
            <noautocomplete/>
            <authmode>Active Directory</authmode>
            <backend/>
            <althostnames></althostnames>
        </webgui>
        <disablesegmentationoffloading/>
        <disablelargereceiveoffloading/>
        <ipv6allow/>
        <powerd_ac_mode>hadp</powerd_ac_mode>
        <powerd_battery_mode>hadp</powerd_battery_mode>
        <bogons>
            <interval>daily</interval>
        </bogons>
        <ssh>
            <sshdkeyonly>enabled</sshdkeyonly>
        </ssh>
        <enableserial/>
        <serialspeed>115200</serialspeed>
        <enablesshd>enabled</enablesshd>
        <sshdkeyonly/>
        <maximumstates/>
        <aliasesresolveinterval/>
        <maximumtables/>
        <maximumtableentries>500000</maximumtableentries>
        <enablenatreflectionpurenat>yes</enablenatreflectionpurenat>
        <enablebinatreflection>yes</enablebinatreflection>
        <enablenatreflectionhelper>yes</enablenatreflectionhelper>
        <reflectiontimeout/>
        <gitsync>
            <repositoryurl>git://github.com/pfsense/pfsense.git</repositoryurl>
            <branch>RELENG_2_1</branch>
            <synconupgrade/>
        </gitsync>
        <language>en_US</language>
        <dns1gw>none</dns1gw>
        <dns2gw>none</dns2gw>
        <dns3gw>none</dns3gw>
        <dns4gw>none</dns4gw>
        <authserver>
        </authserver>
        <use_mfs_tmp_size/>
        <use_mfs_var_size/>
        <kill_states/>
        <dnsserver>127.0.0.1</dnsserver>
        <dnsserver>192.168.0.151</dnsserver>
        <dnsserver>192.168.0.150</dnsserver>
        <firmware>
            <allowinvalidsig/>
            <disablecheck/>
            <alturl>
                <enable/>
                <firmwareurl>http://snapshots.pfsense.org/FreeBSD_RELENG_8_3/i386/pfSense_RELENG_2_1/.updaters/</firmwareurl>
            </alturl>
        </firmware>
        <earlyshellcmd>/usr/local/bin/php -f /usr/local/bin/apply_patches.php</earlyshellcmd>
    </system>
    <interfaces>
        <wan>
            <if>pppoe0</if>
            <descr><![CDATA[WAN]]></descr>
            <blockbogons/>
            <spoofmac/>
            <enable/>
            <ipaddr>pppoe</ipaddr>
            <blockpriv/>
        </wan>
        <lan>
            <enable/>
            <if>nfe0</if>
            <descr><![CDATA[LAN]]></descr>
            <spoofmac/>
            <ipaddr>192.168.0.254</ipaddr>
            <subnet>24</subnet>
            <ipaddrv6>2001:470:xxx:xxx:192:168::254</ipaddrv6>
            <subnetv6>64</subnetv6>
        </lan>
        <opt2>
            <descr><![CDATA[HEIPv6]]></descr>
            <if>gif0</if>
            <enable/>
            <spoofmac/>
            <mtu>1452</mtu>
            <blockbogons/>
            <blockpriv/>
        </opt2>
        <opt3>
            <descr><![CDATA[ModemAccess]]></descr>
            <if>rl0</if>
            <spoofmac/>
            <enable/>
            <ipaddr>192.168.255.254</ipaddr>
            <subnet>24</subnet>
            <gateway>ModemAccessGW</gateway>
        </opt3>
    </interfaces>
    <staticroutes/>
    <dhcpd>
        <lan>
            <range>
                <from>192.168.0.10</from>
                <to>192.168.0.245</to>
            </range>
        </lan>
    </dhcpd>
    <pptpd>
        <mode/>
        <redir/>
        <localip/>
        <remoteip/>
    </pptpd>
    <dnsmasq>
    </dnsmasq>
    <snmpd>
    </snmpd>
    <diag>
        <ipv6nat>
            <ipaddr/>
        </ipv6nat>
    </diag>
    <bridge/>
    <syslog>
        <reverse/>
        <nentries>200</nentries>
        <filterdescriptions>1</filterdescriptions>
    </syslog>
    <nat>
        <ipsecpassthru>
            <enable/>
        </ipsecpassthru>
        <advancedoutbound/>
    </nat>
    <filter>
        <rule>
            <id/>
            <type>pass</type>
            <ipprotocol>inet46</ipprotocol>
            <tag/>
            <tagged/>
            <direction>any</direction>
            <floating>yes</floating>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <protocol>icmp</protocol>
            <source>
                <any/>
            </source>
            <destination>
                <any/>
            </destination>
            <descr><![CDATA[Allow IPv4/IPv6 ICMP packets]]></descr>
        </rule>

        <rule>
            <id/>
            <type>pass</type>
            <interface>wan</interface>
            <ipprotocol>inet46</ipprotocol>
            <tag/>
            <tagged/>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <protocol>tcp</protocol>
            <source>
                <address>RAS</address>
            </source>
            <destination>
                <network>wanip</network>
                <port>ManagementPorts</port>
            </destination>
            <descr><![CDATA[Allow remote firewall management]]></descr>
        </rule>
        <rule>
            <descr><![CDATA[OpenVPN testdomain OpenVPN wizard]]></descr>
            <direction>in</direction>
            <source>
                <any/>
            </source>
            <destination>
                <network>wanip</network>
                <port>1194</port>
            </destination>
            <interface>wan</interface>
            <protocol>udp</protocol>
            <type>pass</type>
            <enabled>on</enabled>
        </rule>
        <rule>
            <type>pass</type>
            <ipprotocol>inet</ipprotocol>
            <descr><![CDATA[Default allow LAN to any rule]]></descr>
            <interface>lan</interface>
            <source>
                <network>lan</network>
            </source>
            <destination>
                <any/>
            </destination>
        </rule>
        <rule>
            <type>pass</type>
            <ipprotocol>inet6</ipprotocol>
            <descr><![CDATA[Default allow LAN IPv6 to any rule]]></descr>
            <interface>lan</interface>
            <source>
                <network>lan</network>
            </source>
            <destination>
                <any/>
            </destination>
        </rule>
        <rule>
            <id/>
            <type>pass</type>
            <interface>enc0</interface>
            <ipprotocol>inet</ipprotocol>
            <tag/>
            <tagged/>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <source>
                <any/>
            </source>
            <destination>
                <any/>
            </destination>
            <descr><![CDATA[Allow IPSec IPv4 to any rule]]></descr>
        </rule>
        <rule>
            <id/>
            <type>pass</type>
            <interface>enc0</interface>
            <ipprotocol>inet6</ipprotocol>
            <tag/>
            <tagged/>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <source>
                <any/>
            </source>
            <destination>
                <any/>
            </destination>
            <descr><![CDATA[Allow IPSec IPv6 to any rule]]></descr>
        </rule>
        <rule>
            <descr><![CDATA[OpenVPN testdomain OpenVPN wizard]]></descr>
            <source>
                <any/>
            </source>
            <destination>
                <any/>
            </destination>
            <interface>openvpn</interface>
            <type>pass</type>
            <enabled>on</enabled>
        </rule>
        <rule>
            <id/>
            <type>pass</type>
            <interface>openvpn</interface>
            <ipprotocol>inet6</ipprotocol>
            <tag/>
            <tagged/>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <source>
                <any/>
            </source>
            <destination>
                <any/>
            </destination>
            <descr><![CDATA[Allow OpenVPN IPv6 to any rule]]></descr>
        </rule>
        <rule>
            <id/>
            <type>pass</type>
            <interface>opt2</interface>
            <ipprotocol>inet46</ipprotocol>
            <tag/>
            <tagged/>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <protocol>tcp</protocol>
            <source>
                <address>RAS</address>
            </source>
            <destination>
                <network>opt2ip</network>
                <port>ManagementPorts</port>
            </destination>
            <descr><![CDATA[Allow remote firewall management]]></descr>
        </rule>
        <rule>
            <id/>
            <type>pass</type>
            <interface>opt2</interface>
            <ipprotocol>inet6</ipprotocol>
            <tag/>
            <tagged/>
            <max/>
            <max-src-nodes/>
            <max-src-conn/>
            <max-src-states/>
            <statetimeout/>
            <statetype>keep state</statetype>
            <os/>
            <protocol>udp</protocol>
            <source>
                <any/>
            </source>
            <destination>
                <network>opt2ip</network>
                <port>1194</port>
            </destination>
            <descr><![CDATA[OpenVPN testdomain]]></descr>
        </rule>
    </filter>
    <shaper>
    </shaper>
    <ipsec>
        <phase1>
            <ikeid>1</ikeid>
            <interface>wan</interface>
            <remote-gateway>188.xx.xx.xx</remote-gateway>
            <mode>main</mode>
            <protocol>inet</protocol>
            <myid_type>asn1dn</myid_type>
            <myid_data/>
            <peerid_type>asn1dn</peerid_type>
            <peerid_data/>
            <encryption-algorithm>
                <name>aes</name>
                <keylen>128</keylen>
            </encryption-algorithm>
            <hash-algorithm>sha1</hash-algorithm>
            <dhgroup>2</dhgroup>
            <lifetime>28800</lifetime>
            <pre-shared-key/>
            <private-key/>
            <certref>52297a823fe8a</certref>
            <caref>522978178c796</caref>
            <authentication_method>rsasig</authentication_method>
            <generate_policy/>
            <proposal_check>strict</proposal_check>
            <nat_traversal>on</nat_traversal>
            <dpd_delay>10</dpd_delay>
            <dpd_maxfail>5</dpd_maxfail>
        </phase1>
        <phase1>
            <ikeid>2</ikeid>
            <interface>wan</interface>
            <mobile/>
            <mode>aggressive</mode>
            <protocol>inet</protocol>
            <myid_type>myaddress</myid_type>
            <myid_data/>
            <peerid_type>user_fqdn</peerid_type>
            <peerid_data>vpnusers@testdomain.local</peerid_data>
            <encryption-algorithm>
                <name>aes</name>
                <keylen>128</keylen>
            </encryption-algorithm>
            <hash-algorithm>sha1</hash-algorithm>
            <dhgroup>2</dhgroup>
            <lifetime>86400</lifetime>
            <pre-shared-key></pre></pre-shared-key>
<private-key/>
<certref/>
<caref/>
<authentication_method>xauth_psk_server</authentication_method>
<generate_policy>unique</generate_policy>
<proposal_check>strict</proposal_check>
<nat_traversal>force</nat_traversal>
<dpd_delay>60</dpd_delay>
<dpd_maxfail>5</dpd_maxfail>
</phase1>
<client>
<enable/>
<user_source>Active Directory</user_source>
<group_source>system</group_source>
<pool_address>192.168.30.0</pool_address>
<pool_netbits>24</pool_netbits>
<net_list/>
<save_passwd/>
<dns_domain>testdomain.local</dns_domain>
<dns_server1>192.168.0.151</dns_server1>
<dns_server2>192.168.0.150</dns_server2>
<dns_server3/>
<dns_server4/>
<wins_server1>192.168.0.151</wins_server1>
<wins_server2/>
<login_banner/>
</client>
<phase2>
<ikeid>1</ikeid>
<mode>tunnel</mode>
<localid>
<type>network</type>
<address>192.168.0.0</address>
<netbits>24</netbits>
</localid>
<remoteid>
<type>network</type>
<address>10.0.0.0</address>
<netbits>24</netbits>
</remoteid>
<protocol>esp</protocol>
<encryption-algorithm-option>
<name>aes</name>
<keylen>128</keylen>
</encryption-algorithm-option>
<hash-algorithm-option>hmac_sha1</hash-algorithm-option>
<pfsgroup>2</pfsgroup>
<lifetime>3600</lifetime>
<pinghost/>
</phase2>
<phase2>
<ikeid>2</ikeid>
<mode>tunnel</mode>
<localid>
<type>network</type>
<address>192.168.0.0</address>
<netbits>24</netbits>
</localid>
<remoteid>
<type>mobile</type>
</remoteid>
<protocol>esp</protocol>
<encryption-algorithm-option>
<name>aes</name>
<keylen>128</keylen>
</encryption-algorithm-option>
<hash-algorithm-option>hmac_sha1</hash-algorithm-option>
<pfsgroup>0</pfsgroup>
<lifetime>28800</lifetime>
<pinghost/>
<mobile/>
</phase2>
<enable/>
</ipsec>
<aliases>
<alias>
<name>DNSServers</name>
<address></address>
<descr><![CDATA[DNS Servers]]></descr>
<type>host</type>
</alias>
<alias>
<name>ManagementPorts</name>
<address>22 443</address>
<descr><![CDATA[Ports used for firewall management]]></descr>
<type>port</type>
</alias>
<alias>
<name>Modem</name>
<address>192.168.255.1</address>
<descr><![CDATA[VDSL modem]]></descr>
<type>host</type>
</alias>
<alias>
<name>PrivateNetworks</name>
<address>10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 127.0.0.0/8</address>
<descr><![CDATA[RFC 1918 networks]]></descr>
<type>network</type>
</alias>
<alias>
<name>RAS</name>
<address></address>
<descr><![CDATA[Hosts with remote access allowed]]></descr>
<type>network</type>
</alias>
</aliases>
<proxyarp/>
<cron>
</cron>
<wol>
</wol>
<rrd>
<enable/>
</rrd>
<load_balancer>
</load_balancer>
<widgets>
</widgets>
<revision>
</revision>
<openvpn>
<openvpn-server>
<vpnid>1</vpnid>
<mode>server_tls_user</mode>
<authmode>Active Directory</authmode>
<protocol>UDP</protocol>
<dev_mode>tun</dev_mode>
<ipaddr/>
<interface>wan</interface>
<local_port>1194</local_port>
<description><![CDATA[testdomain OpenVPN]]></description>
<custom_options/>
<tls></tls>
<caref>522badb76e1c4</caref>
<crlref>522bb51a85c3c</crlref>
<certref>522bb03963c1a</certref>
<dh_length>2048</dh_length>
<cert_depth>1</cert_depth>
<strictusercn/>
<crypto>AES-256-CBC</crypto>
<engine>none</engine>
<tunnel_network>10.22.33.0/24</tunnel_network>
<tunnel_networkv6>2001:470:xxxx:xxxx::/64</tunnel_networkv6>
<remote_network/>
<remote_networkv6/>
<gwredir/>
<local_network>192.168.0.0/24</local_network>
<local_networkv6>2001:470:xx:xx::/64</local_networkv6>
<maxclients>5</maxclients>
<compression>yes</compression>
<passtos/>
<client2client/>
<dynamic_ip>yes</dynamic_ip>
<pool_enable>yes</pool_enable>
<topology_subnet>yes</topology_subnet>
<serverbridge_dhcp/>
<serverbridge_interface>none</serverbridge_interface>
<serverbridge_dhcp_start/>
<serverbridge_dhcp_end/>
<dns_domain>testdomain.local</dns_domain>
<dns_server1>192.168.0.151</dns_server1>
<dns_server2>192.168.0.150</dns_server2>
<dns_server3/>
<dns_server4/>
<ntp_server1>192.168.0.151</ntp_server1>
<ntp_server2/>
<netbios_enable/>
<netbios_ntype>0</netbios_ntype>
<netbios_scope/>
</openvpn-server>
</openvpn>
<l7shaper>
<container/>
</l7shaper>
<dnshaper/>
<dhcpdv6>
<lan>
<ramode>unmanaged</ramode>
<rapriority>medium</rapriority>
<rainterface/>
<range>
<from/>
<to/>
</range>
<prefixrange>
<from/>
<to/>
<prefixlength>64</prefixlength>
</prefixrange>
<defaultleasetime/>
<maxleasetime/>
<netmask/>
<domain/>
<domainsearchlist/>
<ddnsdomain/>
<tftp/>
<ldap/>
<nextserver/>
<filename/>
<rootpath/>
<dhcpv6leaseinlocaltime>yes</dhcpv6leaseinlocaltime>
<numberoptions/>
<radnsserver>2001:470:xx:xx::151</radnsserver>
<radnsserver>2001:470:xx:xx::150</radnsserver>
</lan>
</dhcpdv6>
<ppps>
<ppp>
<ptpid>0</ptpid>
<type>pppoe</type>
<if>pppoe0</if>
<ports>xl0</ports>
<username></username>
<password></password>
<provider/>
</ppp>
</ppps>
<gifs>
<gif>
<ipaddr/>
<if>wan</if>
<tunnel-local-addr>2001:470:xx:xx::2</tunnel-local-addr>
<tunnel-remote-addr>2001:470:xx:xx::1</tunnel-remote-addr>
<tunnel-remote-net>64</tunnel-remote-net>
<remote-addr>216.66.86.122</remote-addr>
<descr><![CDATA[HE IPv6 Tunnel]]></descr>
<gifif>gif0</gifif>
</gif>
</gifs>
<gateways>
<gateway_item>
<interface>opt3</interface>
<gateway>192.168.255.1</gateway>
<name>ModemAccessGW</name>
<weight>1</weight>
<ipprotocol>inet</ipprotocol>
<interval/>
<descr><![CDATA[VDSL Modem Access]]></descr>
</gateway_item>
</gateways>
<ntpd>
<interface>lan</interface>
</ntpd>
<ezshaper>
</ezshaper>
<dhcrelay>
</dhcrelay>
<dhcrelay6>
</dhcrelay6>
<dyndnses>
</dyndnses>
<ovpnserver>
<step10>
<interface>wan</interface>
<protocol>UDP</protocol>
<localport>1194</localport>
<descr><![CDATA[testdomain OpenVPN]]></descr>
<tlsauth>on</tlsauth>
<gentlskey>on</gentlskey>
<dhkey>2048</dhkey>
<crypto>AES-256-CBC</crypto>
<engine>none</engine>
<tunnelnet>10.20.30.0/24</tunnelnet>
<localnet>192.168.0.0/24</localnet>
<concurrentcon>5</concurrentcon>
<compression>on</compression>
<dynip>on</dynip>
<addrpool>on</addrpool>
<dns1>192.168.0.150</dns1>
<dns2>192.168.0.151</dns2>
<ntp1>192.168.0.151</ntp1>
<nbttype>0</nbttype>
</step10>
<step11>
<ovpnrule>on</ovpnrule>
<ovpnallow>on</ovpnallow>
</step11>
</ovpnserver>
</pfsense>
Actions #16

Updated by Doktor Notor about 10 years ago

Argh, this Redmine thing really does not handle inlined code in any usable way. Attached instead.

Actions #17

Updated by Renato Botelho about 10 years ago

Your setup is almost the same I have here. The only difference is I forced the dynamic gif gateway to be default. Just edit the automatically created dynamic TUNNELv6 gateway, set it as default gw and save it. Could you try it please?

Actions #18

Updated by Doktor Notor about 10 years ago

Ah, OK. Yes, that worked.

Actions #19

Updated by Renato Botelho about 10 years ago

  • Status changed from Feedback to Resolved

Thanks, I'll update the how to on docs.

Actions

Also available in: Atom PDF