Em Fri, 19 Sep 2025 07:40:35 +0200 (CEST), Thomas Dettbarn
<[email protected]> escreveu:

|  doee it work when you disable the firewall?
|   
|  pfctl -d

Hi Thomas,

# pfctl -F all
1 tables deleted.
rules cleared
1 states cleared
source tracking entries cleared
pf: statistics cleared
pf: interface flags reset

# pfctl -d     
pfctl: pf not enabled

Rebooted the corporated laptop.
It gets the right internal IPv4 address, netmask and gateway.
No connection to Internet.
Can't connect to the Fortinet server.

Thank you,


Luís Mendes

 
|  Luis Mendes <[email protected]> hat am 19.09.2025 01:21 CEST
geschrieben: |  >  
|  >  
|  > Hi,
|  >  
|  > I've a corporate laptop that uses Forticlient to establish a VPN
|  > connection to corporate resources.
|  >  
|  > When working at home, when this corporate laptop is connected
through the ISP |  > router, there's no problem connecting to the VPN
server. |  >  
|  > Now, I'm setting up my own OpenBSD 7.7 amd64 router/firewall.
|  >  
|  > Using simple NAT rules, other systems can connect fine to the
Internet, also the corporate |  > laptop can connect fine for
everything except the VPN resources. |  > When I try to connect the
VPN, Forticlient 2.7.8.1140 returns: |  > "a network error prevented
updates from being downloaded". |  >  
|  > I asked in the community Fortinet forum about this and was told by
a power user that: |  >
(https://community.fortinet.com/t5/Support-Forum/How-to-configure-home-router-firewall-to-allow-Forticlient/m-p/411072)
|  > |  > """
|  > No special rule needed, except need to open the outgoing
connection to the remote SSL VPN server IP:port (usually TCP 443 or
10443). |  > |  > NAT is fully supported.
|  > """
|  >  
|  >  
|  > Here's my router/firewall configuration:
|  >  
|  > # uname -a
|  > OpenBSD futro2.Home 7.7 GENERIC.MP#625 amd64
|  >  
|  > # sysctl -a | grep forwarding
|  > net.inet.ip.forwarding=1
|  > net.inet.ip.mforwarding=0
|  > net.inet6.ip6.forwarding=0
|  > net.inet6.ip6.mforwarding=0
|  >  
|  > # dhcpd -f
|  > Multiple interfaces match the same subnet: em0 ure0
|  > Multiple interfaces match the same shared network: em0 ure0
|  > Listening on ure0 (192.168.1.253).
|  > Can't listen on re0 - dhcpd.conf has no subnet declaration for
17.7.7.7. |  > Can't listen on em1 - it has no IP address.
|  > Listening on em0 (192.168.1.252).
|  > DHCPREQUEST for 192.168.1.7 from cc:....... via ure0
|  > DHCPACK on 192.168.1.7 to cc:....... via ure0
|  > DHCPREQUEST for 192.168.1.12 from 38:........... via ure0
|  > DHCPACK on 192.168.1.12 to 38:.......... via ure0
|  > DHCPINFORM from 192.168.1.12
|  > DHCPACK to 192.168.1.12 (38:...........) via ure0
|  >  
|  > DHCPINFORM from 192.168.1.12
|  > DHCPACK to 192.168.1.12 (38:............) via ure0
|  >  
|  > The corporate laptop receives 192.168.1.12 IP.
|  >  
|  >  
|  > # pfctl -s rules
|  > match in all scrub (no-df random-id max-mss 1440)
|  > match out on egress inet from ! (egress:network) to any nat-to
(egress:0) round-robin |  > block drop in quick on egress from
<martians> to any |  > block return out quick on egress from any to
<martians> |  > pass out all flags S/SA
|  > pass quick on ure0 all flags S/SA
|  > block drop in quick on ! egress inet from 17.7.7.0/24 to any
|  > block drop in quick inet from 177.7.7..7 to any
|  > block drop in quick on ! re0 inet from 17.7.7.0/24 to any
|  > pass inet proto icmp all
|  > anchor "ftp-proxy/*" all
|  > pass in quick inet proto tcp from any to any port = 21 flags S/SA
divert-to 127.0.0.1 port 8021 |  > anchor "relayd/*" all
|  > pass out on re0 inet from 192.168.1.0 to any flags S/SA nat-to
(re0) round-robin |  > pass in log on egress proto tcp from any to
(egress) port = 22 flags S/SA |  > pass in on ure0 proto tcp from any
to any port = 80 flags S/SA |  > pass in on ure0 proto tcp from any to
any port = 443 flags S/SA |  > pass in log on ure0 inet proto tcp from
192.168.1.0 to any port = 5901 flags S/SA |  > pass in quick on ure0
inet proto tcp from 192.168.1.0 to any port = 22104 flags S/SA |  >
pass in quick on ure0 inet proto udp from any port = 67 to any port =
68 |  > pass in quick on ure0 proto tcp from any to any port = 853
flags S/SA |  > pass in quick on ure0 proto udp from any to any port =
53 |  > pass in quick on re0 proto tcp from any to any port = 853 flags
S/SA |  > pass in quick on re0 proto udp from any to any port = 53 |  >
block return in on ! lo0 proto tcp from any to any port 6000:6010 |  >  
|  >  
|  > It seems that 'pfctl -s nat' is no longer available.
|  >  
|  >  
|  > Can you please tell me what am I missing or doing wrong?
|  >  
|  > Thanks,
|  >  
|  >  
|  > Luís Mendes
|  > 

Reply via email to