07-07-2023 01:15 PM
Hello everyone,
I made a Wireguard VPN server in Proxmox with no internal firewall. Our firewall is Cisco Firepower 1120 which manages all the aspects.
I have tested connecting to VPN server from within LAN and it worked but no internet access, I added iptables and now it's working. So, I know VPN server is working. I am still not able to connect to the VPN server from outside of LAN. Wireguard is not able to handshake with the server.
This might be ip/port forwarding issue. I may be missing something. I have the following set up already below. Let me know if I am missing something? Any help is appreciated!
07-08-2023 12:05 AM
simple topology can help me here,
you config Server INside, the client of Server INside or OUTside ?
07-10-2023 05:40 AM
Server is inside and client is outside. This is not working.
Server is inside and client is inside (using local ip). VPN is working
07-10-2023 05:50 AM
Server INside Client OUTside not working
you need
static NATing for Private Server IP to FPR OUTside public IP for specific Port (port Server use), did you add this NATing rule ?
07-10-2023 05:55 AM
Yes, I have added the NAT rule mentioned in my original post, there is a snip of it. Is there anything I am missing in the NAT rule?
07-10-2023 06:02 AM
I don't see anything wrong with your NAT or security rule, assuming the VPN-Server IP is configured with the real private IP address of the server. Could it be a block on the ISP router? do you know if NAT'ing is applied to their device? if so, then that should be disabled and the NAT should only be on the firewall, or the NAT on the firewall should be turned off and configured on the ISP router. Also, if you run packet capture on the firewall outside interface for any traffic destined to port 51820, do you see any traffic?
07-10-2023 06:36 AM
Yes, the VPN-Server is set to 192.168.1.158 which is a local IP. I have tried to look into capture but found this instead:
translate_hits = 4567, untranslate_hits = 4317
10 (inside) to (outside) source static VPN-Server interface service _|NatOrigSvc_711a30b9-1cc9-11ee-a336-17761654d6de _|NatMappedSvc_711a30b9-1cc9-11ee-a336-1776165
4d6de
Not sure if this is something. Seems to be showing that the NAT is getting hit.
07-11-2023 12:16 AM
Yes that shows the NAT hits, but I would try to run packet capture on the outside interface with the command "cap < name > interface outside match tcp any host < the outside interface IP> eq 51820". If that port is a UDP port then please change the tcp keyword on the capture command to udp. Also, as you don't have any hits on the security rule you created, I'm wondering if there is any security policy above that one that is denying the traffic coming from the outside towards the server, worth checking.
07-10-2023 06:11 AM
port, you need to specify port, that what missing in your NAT
07-10-2023 06:31 AM
The Source Port is set to VPN which I created is set to 51820 as mentioned in the snip. If that's not what you are talking about, please let me know.
07-10-2023 06:51 AM
in advance of NAT edit
there is route-lookup option ? if yes enable it.
07-10-2023 07:03 AM
I tried to enable it but I received this error:
07-10-2023 07:11 AM
how many public IP you beside the OUTside public IP ?
07-10-2023 07:12 AM
We have only one public IP.
07-10-2023 07:22 AM
can you share packet tracer you test
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide