Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New OpenVPN server, can connect but can't get to LAN subnet.

    Scheduled Pinned Locked Moved OpenVPN
    51 Posts 4 Posters 7.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @fatman032
      last edited by

      @fatman032 said in New OpenVPN server, can connect but can't get to LAN subnet.:

      The part that I don't get is why I'm not seeing any blocks now form this network to my LAN network.

      Possibly because pfSense doesn't block any.
      Maybe the remote device blocks the access by its own firewall. Since you said, this was already working before, this shouldn't be the case, but possibly you had set up a workaround with masquerading.

      To investigate on pfSense you can take a packet capture on LAN, while you try to access from the remote client to see if the device is responding properly.

      F 1 Reply Last reply Reply Quote 0
      • F
        fatman032 @viragomann
        last edited by

        @viragomann I think I found part of the problem. I added the OpenVPN rule back in. I can now see blocks from 192.168.193.2

        66ea34ad-467a-4490-a31f-6baf74031d4e-image.png

        V 1 Reply Last reply Reply Quote 0
        • chpalmerC
          chpalmer @viragomann
          last edited by

          @viragomann said in New OpenVPN server, can connect but can't get to LAN subnet.:

          @chpalmer
          No, it's a private one out of 192.168.0.0/16.

          I see that now.. I was an octet off.

          Triggering snowflakes one by one..
          Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

          1 Reply Last reply Reply Quote 1
          • V
            viragomann @fatman032
            last edited by

            @fatman032
            These blocks are out of state packets. That is no traffic which should be allowed at all.
            However, I've no idea, why you see this only, when you allow traffic on the OpenVPN interface.

            Is the port 5000 this one you tried to access from the remote client?

            F 1 Reply Last reply Reply Quote 0
            • F
              fatman032 @viragomann
              last edited by

              @viragomann Nope I can try any LAN IP device and I get the same thing. At this point I'm about restore my entire firewall and start over. The other strange part is when I try to reset the states it basically is crashing the browser. I read this might be because it is running into some sort of error and can't rebuilt the states.

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @fatman032
                last edited by

                @fatman032
                Do you have a Synology which you tried to access from the client?

                F 1 Reply Last reply Reply Quote 0
                • F
                  fatman032 @viragomann
                  last edited by fatman032

                  @viragomann yes and a raspberry pi is hosting a web server that I play with. I block all traffic on it so it can't get out to the internet. This is part of the reason I want to setup the VPN.

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @fatman032
                    last edited by

                    @fatman032
                    So maybe on the vpn client runs any software, which is accessing it. But the Synology may send responses to another destination than pfSense, because it uses another default gateway.

                    F 1 Reply Last reply Reply Quote 0
                    • F
                      fatman032 @viragomann
                      last edited by fatman032

                      Okay so I factory reset my pfSense. I have nothing plugged into my network but one computer and my raspberry pi at 192.168.192.12.
                      My LAN network is 192.168.192.0/24

                      I setup the VPN using these setups instructions.

                      I have no other VLans no other VPNs. I have two any to any rules on every interface. One for IPV4 and one for IPV6.
                      d529f028-75e7-4909-a828-db49c3aae61b-image.png

                      I'm still getting a default deny rule. I have no idea what is going on.
                      baf10a2b-dba1-4e75-966e-7f619ea70ef7-image.png

                      I know this is not the ideal setup. I just want to get everything out of the way that could be causing this problem. I have no idea how this can be blocked. I don't remember my other netgate being this big of a pain to setup. Is there something different with this new SG-2100?

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @fatman032
                        last edited by

                        @fatman032
                        Again, it look like that the raspberry is sending response not to pfSense, but to another device.

                        So go to the Pi and check out his routing table to get any further, please.

                        F 1 Reply Last reply Reply Quote 0
                        • F
                          fatman032 @viragomann
                          last edited by

                          @viragomann Sorry had a bad night just wanting to get this working.
                          Here is the routing table for the pi.
                          5bc89aed-5a33-48c1-9ea0-570809f376d9-image.png

                          V 1 Reply Last reply Reply Quote 0
                          • V
                            viragomann @fatman032
                            last edited by

                            @fatman032
                            And what's the LAN IP of pfSense? Does it match?

                            F 1 Reply Last reply Reply Quote 0
                            • F
                              fatman032 @viragomann
                              last edited by fatman032

                              @viragomann Yes they Match. The LAN is 192.168.192.0/24
                              Here you go. It has new IP since it no longer has a reservation.
                              e96d6a88-4b40-4e0d-bbb7-eb020cccfb54-image.png

                              V 1 Reply Last reply Reply Quote 0
                              • V
                                viragomann @fatman032
                                last edited by

                                @fatman032 said in New OpenVPN server, can connect but can't get to LAN subnet.:

                                Yes they Match. The LAN is 192.168.192.0/24

                                That's not a proper Interface IP, that's a network address.

                                F 1 Reply Last reply Reply Quote 0
                                • F
                                  fatman032 @viragomann
                                  last edited by fatman032

                                  @viragomann Here you go.
                                  89b16473-49b6-4822-823c-8ab012d16e89-image.png

                                  V 1 Reply Last reply Reply Quote 0
                                  • V
                                    viragomann @fatman032
                                    last edited by

                                    @fatman032
                                    All right. So I cannot tell you, why you run into these out-of-state blocks on LAN:
                                    eb3bd731-2534-4e37-8184-a131372e174a-grafik.png

                                    Since the source port is 80 and the flag is SA, these are definitely respond packets SYN packets. And presumably pfSense did never see the respective SYN packets.

                                    Okay, do you connect your VPN clients from inside your LAN?

                                    F 1 Reply Last reply Reply Quote 0
                                    • F
                                      fatman032 @viragomann
                                      last edited by

                                      @viragomann no I have been using my cell as a hotspot.

                                      V 1 Reply Last reply Reply Quote 0
                                      • V
                                        viragomann @fatman032
                                        last edited by

                                        @fatman032 said in New OpenVPN server, can connect but can't get to LAN subnet.:

                                        no I have been using my cell as a hotspot.

                                        Also cut all internal connections?

                                        Need to see the clients routing table to get closer.

                                        F 1 Reply Last reply Reply Quote 0
                                        • F
                                          fatman032 @viragomann
                                          last edited by

                                          @viragomann

                                          Also cut all internal connections?

                                          Yes, I turn off the Wi-Fi.

                                          Need to see the clients routing table to get closer.

                                          0ed490ff-215b-409e-8088-ed2500fe518c-image.png

                                          V 1 Reply Last reply Reply Quote 0
                                          • V
                                            viragomann @fatman032
                                            last edited by viragomann

                                            @fatman032
                                            Looks well.

                                            Ensure that also your cell phone has no internal connection at the time you test the VPN via the hotspot.

                                            I'm sure, there must be something wrong in your setup. You have obviously an asymmetric routing issue on the VPN.
                                            For further investigation I can only suggest to sniff the traffic on all involved interface while you try to access the LAN from the VPN client.
                                            I guess, the SYN packets don't come in on the VPN interface.

                                            F 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.