Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ipsec & OpenVPN mixed VPN

    Scheduled Pinned Locked Moved OpenVPN
    9 Posts 2 Posters 804 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      croberti69
      last edited by

      c6101e8b-ec08-45c7-8563-b591c2dccf25-immagine.png

      Can anyone help me for this problem? The remote pc in openvpn pings and accesses the servers in office2, the networks between office2 and office1 communicate perfectly, but from the remote pc I can't see the office network 1. Is there a way to make it communicate? Traceroute from 10.10.10.x to 192.168.100.x stops at pfsense2 and that from a machine in office 1 to 10.10.10.x stops at pfsense1. The IPSec tunnel is always active.
      Thanks.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @croberti69
        last edited by

        @croberti69

        First off, the type of VPN is irrelevant. Both are just another IP path. Your problem has to do with routing. The remote PCs know how to reach the network they connect to, but nothing beyond. What is your default route? Do you have a specific route, if the default doesn't cover it?

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        C 1 Reply Last reply Reply Quote 0
        • C
          croberti69 @JKnott
          last edited by

          @jknott
          For remote PCs the remote networks are 192.168.90.0/24, 192.168.100.0/24, infact traceroute from 10.10.10.x to 192.168.100.x stops at pfsense2.
          I don't know how to handle further steps because pfs2 should already know where 192.168.100.x is and the route to take. But it stops.

          JKnottJ 1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott @croberti69
            last edited by

            @croberti69

            When a remote computer is connected via VPN, what is the default route? Is it whatever you get from your ISP or is it through the VPN to pfsense? If the first, then, unless you specifically add a route, the remote does not know how to reach beyond the other end of the VPN. One of the settings it to force all traffic through the VPN, which makes it the default route and should fix the problem. On the other hand, if you do not want all traffic to go through the VPN, you will have to add a route to reach beyond pfsense.

            In the server config, there is a box where you can configure which routes to push. You'd have to add one to reach the other site(s). For example, since I force all client traffic through the VPN, here's what I use:
            push "route 0.0.0.0 0.0.0.0";push "route-ipv6 ::/0"

            If you don't send all client traffic through the VPN, you will have to configure your routes as needed. It could be a matter of simply adding the other site in that box. Of course, the two servers would have to configured to provide the route to the other. Also, the other server will need the route back to your remote computer.

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • C
              croberti69
              last edited by

              @jknott
              As you can see below, the route is already passed to the client

              192.168.90.0 255.255.255.0 10.10.10.1 10.10.10.25 259
              192.168.100.0 255.255.255.0 10.10.10.1 10.10.10.25 259

              infact it reach pfs2.

              JKnottJ 1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @croberti69
                last edited by

                @croberti69

                What about the route back from the other site? This is where packet capture comes in handy. See how far your ping reaches and how far any response gets.

                This is a simple routing issue, unless you have some filters in the way.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                C 1 Reply Last reply Reply Quote 0
                • C
                  croberti69 @JKnott
                  last edited by

                  @jknott
                  That's the problem I think, since the pfs1 is the default gw for that lan, but the same pfs1 does not handle correctly the route to 10.10.10.x and I don't know to add a second remote network to the ipsec tunnel.

                  JKnottJ 1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @croberti69
                    last edited by

                    @croberti69

                    You don't add a route to a tunnel. You add it to the routing table. You do that in System / Routing / Static Routes. Any device on the LAN will use pfsense as the default gateway and pfsense will use the routing table to determine where to send the packet.

                    Routing is done on a hop by hop basis, with each router determining what the next hop is to get closer to the destination.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    C 1 Reply Last reply Reply Quote 0
                    • C
                      croberti69 @JKnott
                      last edited by

                      @jknott
                      I finally solved creating another phase2 in ipsec, now works fine.
                      As described here:
                      https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/multiple-subnets.html

                      Thanks again for help.

                      bye.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.