Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New OpenVPN server, can connect but can't get to LAN subnet.

    Scheduled Pinned Locked Moved OpenVPN
    51 Posts 4 Posters 7.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      fatman032 @viragomann
      last edited by

      @viragomann Again I can't thank you enough for the help. I'm learning a lot. I need some time to process all of this but I think I'm getting most of it.

      I never had anything in floating rules. In my post above you can see that. I never fully understood why you would use that rule set.

      Here are some changes.
      I just added the rule about DNS under floating rules.
      76c270d1-f5c2-48d8-b748-a334daeee579-image.png

      Here is my LAN rules. No changes
      60312f2b-acac-405b-b542-ac4f58c6038b-image.png

      My LAN 4 interface rules. No changes
      68ff1b35-063e-406a-9bf5-8405a0114353-image.png

      I removed the any rule on ExpressVPN
      81a0bf28-05ff-421d-84f9-55efa17f3cdf-image.png

      I moved the openVPN rule to OpenVPNServer interface.
      a932eec4-2a7b-40de-aa44-f4ddc1bee7fb-image.png

      Now under openVPN I have no rules again.
      d16f6d2e-b068-4ac3-81e8-604114c2cbf4-image.png

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @fatman032
        last edited by viragomann

        @fatman032
        Okay. The floating rule is not correct. Two things to change:

        Check the "Quick" option. This ensures that the rule is applied before a matching interface rule. Without Quick your LAN4 cannot access DNS, because there is a block rule.

        The source port in the rule has to be "any" as almost. The source port is dynamic, so you must not state it.

        Further on LAN4 in the block rule the gateway setting is useless. The gateway only comes in if the rule matches (interface, protocol, source address and port, destination address and port), but since the rule block anything anyway, there is no use of stating a gateway.

        F 1 Reply Last reply Reply Quote 0
        • F
          fatman032 @viragomann
          last edited by fatman032

          @viragomann Got it. I made the changes. I just tested the VPN and I'm still getting blocked.

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @fatman032
            last edited by

            @fatman032
            Fine. That was just a rule clean up as mentioned before. Now the firewall log should be better readable.
            So are there news?

            I assume, your pfsense is the default gateway in the LAN?

            F 1 Reply Last reply Reply Quote 0
            • F
              fatman032 @viragomann
              last edited by

              @viragomann Yes the default gateway for the LAN network it pfsense.

              Here are the new logs. I agree much cleaner.
              be1ed42f-a77d-41fc-846e-774cc978da3b-image.png

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @fatman032
                last edited by

                @fatman032
                Since the ping from 192.168.193.2 to 192.168.192.10 is blocked in the second line, the rule on the OPENVPNSERVER does obviously not match.
                So either 192.168.193.2 is not included in "OPENVPNSERVER net" or 192.168.192.10 is not included in "LAN net"

                I'm wondering, where do you get the "OPENVPNSERVER net" from?
                I've also assigned interfaces to access servers, but there is not ...net generated by pfSense.

                So I'd replace that by 192.168.193.0/24 and try again.

                Further the log shows that the VPN client tries to access 1.1.1.1 for DNS resolution, which is not allowed.
                Obviously you route the whole clients upstream traffic over the VPN. Is this what you want?
                If yes, you might also have to configure the outbound NAT for the tunnel network.

                F 1 Reply Last reply Reply Quote 0
                • F
                  fatman032 @viragomann
                  last edited by

                  @viragomann I changed the rule for OpenVPNserver. Still no go.

                  e2ee9f98-35a3-4895-887e-7ada57ec584f-image.png

                  I wouldn't mind a spilt tunnel. If I uncheck the box to "Force all client-generated IPv4 traffic through the tunnel.". I don't get any blocks from 192.168.193.2 (source or destination) but still can't get to my devices.

                  I do get blocks and lots of them if I check the above box.

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @fatman032
                    last edited by

                    @fatman032
                    A view to the logs would be helpful.

                    Is the access from 192.168.193.2 to 192.168.192.10 still blocked by the default deny rule?

                    If you unscheck "redirect gateway" you have to enter your LAN network into the "Local Networks" to push the proper route to the client.

                    chpalmerC F 2 Replies Last reply Reply Quote 0
                    • chpalmerC
                      chpalmer @viragomann
                      last edited by

                      OP is using a bogon address as the tunnel 192.168.193.0/24

                      Just FYI

                      Triggering snowflakes one by one..
                      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @chpalmer
                        last edited by

                        @chpalmer
                        No, it's a private one out of 192.168.0.0/16.

                        chpalmerC 1 Reply Last reply Reply Quote 0
                        • F
                          fatman032 @viragomann
                          last edited by

                          @viragomann

                          If I setup the VPN this way. I get no blocks from 192.168.193.0/24
                          41f15bd9-b512-4422-a3c5-9d29f6512b5f-image.png
                          Filter source 192.168.193
                          3d6d5d77-c9c2-4f34-b9ce-10d26fbd504b-image.png
                          Filter Destination192.168.193
                          f534ca65-0d52-4e07-88f7-d30315cb9c54-image.png
                          I do get blocks on my WAN interface but I don't think they have anything to do with OpenVPN. I'm little scared to post those log on the internet since they have my public IP address.

                          If I setup the VPN this way.
                          ac5e6d1f-d704-4a9e-b206-6550fb8127cf-image.png
                          I get blocks. No filter
                          ef0526f7-54e6-45c7-83a4-4d8ad2bf6488-image.png

                          This why I'm so confused.

                          V 1 Reply Last reply Reply Quote 0
                          • V
                            viragomann @fatman032
                            last edited by

                            @fatman032 said in New OpenVPN server, can connect but can't get to LAN subnet.:

                            I'm little scared to post those log on the internet since they have my public IP address.

                            No, you shouldn't show your public IP here. If the logs were relevant you can disguise it, but they might not be.

                            This why I'm so confused.

                            All right with that now. The log shows solely blocks to public IPs.
                            I mentioned already above, by checking "Redirect gateway" the client routes the whole upstream traffic to the vpn server. But your pass rule on OVPNSERVER doesn't allow it, it permits access to LAN net only.

                            F 2 Replies Last reply Reply Quote 0
                            • F
                              fatman032 @viragomann
                              last edited by

                              @viragomann

                              I mentioned already above, by checking "Redirect gateway" the client routes the whole upstream traffic to the vpn server. But your pass rule on OVPNSERVER doesn't allow it, it permits access to LAN net only.

                              I understand that. I just wanted to show this is the only blocks I'm getting now. Also I setup a NAT rule to allow 192.168.193.0/24 out. Not sure why they are still getting blocked. This isn't the part I'm confused on.

                              The part that I don't get is why I'm not seeing any blocks now form this network to my LAN network.

                              V 1 Reply Last reply Reply Quote 0
                              • F
                                fatman032 @viragomann
                                last edited by

                                @viragomann Should I have any rules under OpenVPN?

                                1 Reply Last reply Reply Quote 0
                                • V
                                  viragomann @fatman032
                                  last edited by

                                  @fatman032 said in New OpenVPN server, can connect but can't get to LAN subnet.:

                                  The part that I don't get is why I'm not seeing any blocks now form this network to my LAN network.

                                  Possibly because pfSense doesn't block any.
                                  Maybe the remote device blocks the access by its own firewall. Since you said, this was already working before, this shouldn't be the case, but possibly you had set up a workaround with masquerading.

                                  To investigate on pfSense you can take a packet capture on LAN, while you try to access from the remote client to see if the device is responding properly.

                                  F 1 Reply Last reply Reply Quote 0
                                  • F
                                    fatman032 @viragomann
                                    last edited by

                                    @viragomann I think I found part of the problem. I added the OpenVPN rule back in. I can now see blocks from 192.168.193.2

                                    66ea34ad-467a-4490-a31f-6baf74031d4e-image.png

                                    V 1 Reply Last reply Reply Quote 0
                                    • chpalmerC
                                      chpalmer @viragomann
                                      last edited by

                                      @viragomann said in New OpenVPN server, can connect but can't get to LAN subnet.:

                                      @chpalmer
                                      No, it's a private one out of 192.168.0.0/16.

                                      I see that now.. I was an octet off.

                                      Triggering snowflakes one by one..
                                      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                                      1 Reply Last reply Reply Quote 1
                                      • V
                                        viragomann @fatman032
                                        last edited by

                                        @fatman032
                                        These blocks are out of state packets. That is no traffic which should be allowed at all.
                                        However, I've no idea, why you see this only, when you allow traffic on the OpenVPN interface.

                                        Is the port 5000 this one you tried to access from the remote client?

                                        F 1 Reply Last reply Reply Quote 0
                                        • F
                                          fatman032 @viragomann
                                          last edited by

                                          @viragomann Nope I can try any LAN IP device and I get the same thing. At this point I'm about restore my entire firewall and start over. The other strange part is when I try to reset the states it basically is crashing the browser. I read this might be because it is running into some sort of error and can't rebuilt the states.

                                          V 1 Reply Last reply Reply Quote 0
                                          • V
                                            viragomann @fatman032
                                            last edited by

                                            @fatman032
                                            Do you have a Synology which you tried to access from the client?

                                            F 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.