• OpenVPN tunnel network overlapping LAN network

    14
    0 Votes
    14 Posts
    2k Views
    bingo600B

    @jknott said in OpenVPN tunnel network overlapping LAN network:

    @bingo600

    If they are in fact using /9 and not /8, then use the other half. Regardless, it's still best to use different addresses. What happens if the ISP decides to go with /8? I have done a lot of networking in business environments. I have learned there are commonly used subnets, which should be avoided to prevent collisions. That includes 10. and 192.168 subnets. So, I put my networks on 172.16 to avoid problems.

    IMHO that's pure lottery
    I have been using 172.16.x.x/12 ranges lots of times too.

    The OP mentioned 10.0.0.0/9 , not me

    I think i see something similar w. my ExpressVPN aka. they use RFC1918 for link addresses.

    Here's a "snip" from a DEB10 VM , that is connected via them.

    vpn-01:~$ sudo route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface ...SNIP... 0.0.0.0 10.141.0.35 128.0.0.0 UG 0 0 0 tun0 default 10.xxx.zzz.1 0.0.0.0 UG 0 0 0 ens192 10.141.0.1 10.141.0.35 255.255.255.255 UGH 0 0 0 tun0 10.141.0.35 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 85.www.22.65 10.xxx.zzz.1 255.255.255.255 UGH 0 0 0 ens192 128.0.0.0 10.141.0.35 128.0.0.0 UG 0 0 0 tun0 ...SNIP... vpn-01:~$

    IMHO the OP could just as well use the high 10.x.x.x/9

    Or take the chance with the existing network, until proven otherwise.

    Btw: Neat trick with the 0.0.0.0/1

  • Can only ping one way inside site-to-site VPN link

    12
    0 Votes
    12 Posts
    3k Views
    V

    @deon-0
    It seems as if the IP forwarding doesn't work. Did you restart the primary endpoint machine after adding it?

    To investigate do some tcpdump on the primary on the vpn interface and on pfSense, while you try to ping 10.8.0.2.

  • Policy Based Routing to single Remote IP

    8
    0 Votes
    8 Posts
    738 Views
    V

    @spaceboy
    You can do that on pfSense directly with Diagnostic > Packet Capture.
    Select the interface the client is connected to and enter its IP and start the capture. Access the remote site, then stop the capture to see the result. You will find all IPs the client had called.

    However, it would be more reliable to know the host names, because a host name can be resolved to multiple IP, while the client only call one of it on a single access.
    Since I don't know what your client really tries to access, I'm in the dark here.

  • pfsense OpenVPN won't route to static IPs on LAN but will to DHCP IPs

    4
    0 Votes
    4 Posts
    773 Views
    JKnottJ

    @cctl01

    I can't say for certain, but I suspect from your description you had a /16 subnet mask, which meant those subnets actually overlapped. With a /16 mask, everything within 10.1.0.0 /16 is one subnet.

  • 0 Votes
    2 Posts
    597 Views
    P

    @pcooper I have client logs but the forum will not let me post them.

  • OpenVPN Lan access but no internet?

    2
    0 Votes
    2 Posts
    330 Views
    bingo600B

    @nerdzilla
    IMHO you should describe your setup here, in the thread.
    I'm not going to spend a lot of time watching youtube , in order to understand your setup.

    /Bingo

  • openVPN client Export Utility script to safe on a NAS

    1
    0 Votes
    1 Posts
    160 Views
    No one has replied
  • CYBERGHOST CONFIGURATION

    3
    1 Votes
    3 Posts
    1k Views
    M

    @pepito32 said in CYBERGHOST CONFIGURATION:

    cyberghost

    Hi,

    I found this one:
    https://forum.netgate.com/topic/146717/cyberghost-openvpn-config-files-for-client-get-mangled-by-pfdense-web

  • Cannot route through OpenVPN Peer to Peer mode

    2
    0 Votes
    2 Posts
    302 Views
    RicoR

    You need to add an iroute (VPN > OpenVPN > Client Specific Overrides) when using topology style subnet.
    Use the client cert name as Common Name and fill the Clients local subnet to IPv4 Remote Network/s

    -Rico

  • OpenVPN tap -

    4
    0 Votes
    4 Posts
    690 Views
    M

    @marvosa thanks for answering me.

    The reason why I've deployed a bridged solution is because I am doing a migration of several virtual machine from the siteA to the siteB and I can't change IP address of thoose virtual machine for multiple reasons.

    I've invastigated more deeply the problem and it appears that the issu comes from the pfsense of the siteB.

    In fact, when the pfsenseA (18.254) send a ping to the pfsenseB (18.1), the pfsenseB receive the ping request but it doesn't reply to it.

    And when the pfsenseB (18.1) send a ping to the pfsenseA (18.254), the pfsenseA replies to pings but the pfsenseB doesn't interpret the answer for an unknown reason.

    So I don't really know what is wrong with the pfsenseB.

  • Port forwarding problem (at my wits end)

    7
    0 Votes
    7 Posts
    825 Views
    V

    @sse450
    So the client cannot connect to the server from what I can see here. However, the provided screenshots are not very helpful to investigate this issue.

    Your client log is puzzling me. Seems you have multiple remote lines for different servers / IPs, but since you've replaced all remote IPs with the same string, I have to assume, it is connecting to the same IP on each attempt.

    Is the server running? What does Status > OpenVPN show?

    Is the server listening on WAN address?

    Can you see something in the server log mentioned the connection attempts?

  • Different options available on different devices

    1
    0 Votes
    1 Posts
    177 Views
    No one has replied
  • OpenVPN routing between two networks over tunnel

    3
    0 Votes
    3 Posts
    449 Views
    V

    @holly
    Apart from the routes within OpenVPN, wich you may have already set, you need a route on the device 192.168.178.52 for 192.168.1.250 pointing to 192.168.178.51 (the RPi).

  • P2P; Subnet topology "gateway monitoring" issues

    3
    0 Votes
    3 Posts
    447 Views
    S

    I've been curious about this as well. I have a site-to-site VPN server configured and an interface assigned to it, but I've never managed to get gateway monitoring working properly for it.

  • Inactive setting - Can't get it to work

    10
    0 Votes
    10 Posts
    4k Views
    R

    @m0l50n
    Hello,

    In pfSense navigate to - VPN / OpenVPN / Servers and click on the "pencil" to Edit your Server.

    In the Edit screen scroll all the way down (almost to the bottom) and find - Advanced Configuration. Under Advanced Configuration select Custom Options.

    In Custom Options I have the below line entered
    push "inactive 3600 1000000"

    Hope this is Helpful! Really Great to have idle VPN connections automatically disconnect.

    Best Regards,
    R.K. Graves

  • Hot to push parameter for all mobile client?

    1
    0 Votes
    1 Posts
    248 Views
    No one has replied
  • tap with split tunneling

    1
    0 Votes
    1 Posts
    325 Views
    No one has replied
  • OpenVPN DR Considerations

    1
    0 Votes
    1 Posts
    304 Views
    No one has replied
  • OpenVpn client multi wan failover

    2
    0 Votes
    2 Posts
    415 Views
    V

    @kevin-chan-aebc
    Configure the server to listen on localhost and forward the VPN packets on both WANs to it.

    In the client config file add an additional remote line for the second WAN.

    In the client export utility you can enter the second remote line into the advanced options box, so that it is added to exported config files:
    10a55872-912a-48fa-811e-ab481a57c677-grafik.png

    With server-poll-timeout you may define the timeout, the client tries to connect to the first remote address before switching to the second. The default value is 10 seconds.

  • 0 Votes
    27 Posts
    3k Views
    M

    @pippin After I had changed the Local Port Number in a new Wizard run, the new port number was added to the WAN firewall rules.
    When I was cleaning that up, by accident I removed the wrong port number.
    And then you can do whatever you want, but you will never get it working 😢

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.