• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

LAN access from VPN

NAT
4
26
4.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    ghazel
    last edited by Feb 13, 2023, 9:44 PM

    I have a Netgate 4100. It’s set up to be a Wireguard VPN server, and that’s working great. Peers connected to the Wireguard VPN can see the Netgate on 192.168.1.1 and 192.168.2.1 (which is in their subnet), but they cannot see other LAN devices (192.168.1.x) other than 192.168.1.1. Is there an easy way to allow bidirectional access between 192.168.1.x (LAN) and 192.168.2.x (WG_VPN)? A bridge seems like overkill, maybe just some sort of routing rules, like whatever permits access to 192.168.1.1 (not actually sure why that works)?

    J 1 Reply Last reply Feb 13, 2023, 10:05 PM Reply Quote 0
    • J
      Jarhead @ghazel
      last edited by Feb 13, 2023, 10:05 PM

      @ghazel What did you enter for allowed IP's?

      G 1 Reply Last reply Feb 13, 2023, 11:42 PM Reply Quote 0
      • G
        ghazel @Jarhead
        last edited by Feb 13, 2023, 11:42 PM

        @jarhead on which device?

        The client (a MacBook Pro) says "AllowedIPs = 0.0.0.0/0,::/0" in the [Peer] section that describes the PublicKey / Endpoint for the pfSense server.
        The server (pfSense) says "AllowedIPS = 192.168.2.14/32" for the Peer Address Configuration that describe the client's public key.

        So, when the client connects it gets an IP address of 192.168.2.14, and can contact 192.168.2.1 and 192.168.1.1 (somehow), but not for example 192.168.1.13.

        S J 2 Replies Last reply Feb 14, 2023, 12:39 AM Reply Quote 0
        • S
          SteveITS Galactic Empire @ghazel
          last edited by Feb 14, 2023, 12:39 AM

          @ghazel did you create rules allowing it?
          https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-ra.html#firewall-rules

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          1 Reply Last reply Reply Quote 0
          • J
            Jarhead @ghazel
            last edited by Feb 14, 2023, 1:17 AM

            @ghazel Did you assign an interface to the tunnel or did you just assign the tunnel address in the wireguard config?

            If you assigned an interface you would need to add rules to that interface.
            I didn't look at the link Steve posted so that may already be in there, check that link first.

            1 Reply Last reply Reply Quote 0
            • G
              ghazel
              last edited by Feb 14, 2023, 1:34 AM

              I assigned the interface (WG_VPN) to the tunnel, so I already have both rules.

              J 1 Reply Last reply Feb 14, 2023, 2:26 AM Reply Quote 0
              • J
                Jarhead @ghazel
                last edited by Feb 14, 2023, 2:26 AM

                @ghazel So the outbound NAT should be automatically created then.
                Do you see the tunnel network listed? Firewall/NAT/Outbound

                Make sure the MTU is at 1420 on the wireguard interface.

                Diagnostics/Routes, tunnel listed and on correct interface?

                G 1 Reply Last reply Feb 14, 2023, 5:22 AM Reply Quote 0
                • G
                  ghazel @Jarhead
                  last edited by ghazel Feb 14, 2023, 5:24 AM Feb 14, 2023, 5:22 AM

                  @jarhead I don't see anything interface specific in Firewall/NAT/Outbound, but I do see the 192.168.2.0/24 range.

                  login-to-view

                  Similarly for Diagnostics/Routes, attached screenshot of what seems relevant:
                  login-to-view

                  J 1 Reply Last reply Feb 14, 2023, 11:34 AM Reply Quote 0
                  • J
                    Jarhead @ghazel
                    last edited by Feb 14, 2023, 11:34 AM

                    @ghazel Post pics of rules and configs from both ends.

                    G 1 Reply Last reply Feb 16, 2023, 1:09 AM Reply Quote 0
                    • G
                      ghazel @Jarhead
                      last edited by Feb 16, 2023, 1:09 AM

                      @jarhead not certain which rules and configs you're talking about. One side is pfSense, which I've shown above, the other end is a macOS machine running wireguard. So no rules there, and only the most basic wireguard config.

                      J 1 Reply Last reply Feb 16, 2023, 2:14 AM Reply Quote 0
                      • J
                        Jarhead @ghazel
                        last edited by Feb 16, 2023, 2:14 AM

                        @ghazel When you say "other" LAN devices, are you actually trying other devices or just one? It might be a software firewall on that device if just one.

                        G 1 Reply Last reply Feb 16, 2023, 3:06 AM Reply Quote 0
                        • G
                          ghazel @Jarhead
                          last edited by Feb 16, 2023, 3:06 AM

                          @jarhead Any other device on 192.168.1.1/24 is unreachable. No firewalls on those devices. I guess I could packet capture to see what happens to those packets..

                          1 Reply Last reply Reply Quote 0
                          • G
                            ghazel
                            last edited by Feb 18, 2023, 9:16 AM

                            Packet capture on the pfSense LAN interface does show the packets from 192.168.2.14 (WG_VPN subnet) destined for 192.168.1.16 (LAN subnet). However, there is no response. Perhaps tellingly, 192.168.1.16 can reach 192.168.2.14 and it does respond. So for example I can ssh from 192.168.1.16 to 192.168.2.14, but not from 192.168.2.14 to 192.168.1.16.

                            S J 2 Replies Last reply Feb 18, 2023, 12:46 PM Reply Quote 0
                            • S
                              SteveITS Galactic Empire @ghazel
                              last edited by Feb 18, 2023, 12:46 PM

                              @ghazel but there is a rule on the VPN interface allowing access to lan?

                              Usually it’s:
                              Missing fw rule in arriving interface
                              Device fw doesn’t allow different subnet
                              Device not using pfSense as gateway

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              G 1 Reply Last reply Feb 23, 2023, 8:11 AM Reply Quote 0
                              • J
                                Jarhead @ghazel
                                last edited by Feb 18, 2023, 2:59 PM

                                @ghazel said in LAN access from VPN:

                                Packet capture on the pfSense LAN interface does show the packets from 192.168.2.14 (WG_VPN subnet) destined for 192.168.1.16 (LAN subnet). However, there is no response. Perhaps tellingly, 192.168.1.16 can reach 192.168.2.14 and it does respond. So for example I can ssh from 192.168.1.16 to 192.168.2.14, but not from 192.168.2.14 to 192.168.1.16.

                                I agree with Steve and my guess would be the gateway.
                                You can check by doing the packet capture again but on the WAN instead. You'll probably see the replies being sent out that way.

                                1 Reply Last reply Reply Quote 0
                                • G
                                  ghazel
                                  last edited by Feb 22, 2023, 10:25 PM

                                  I don't see reply packets on WAN. I did uncover more detail that is surprising, though:

                                  Capturing on LAN, I see packets from 192.168.2.14 to 192.168.1.16 as expected. Capturing on the 192.168.1.16 machine, the same packets have the LAN mac address but a source IP of 192.1.68.1.2 -- that's the IP of a Netgear WiFi router running in AP mode (it doesn't run DHCP, and it isn't a gateway), which 192.168.1.16 is connected to. Of course, when 192.168.1.16 responds to 192.168.1.2 it gets ICMP host unreachable responses (with the correct Netgear mac address), and the TCP connection fails.

                                  V 1 Reply Last reply Feb 22, 2023, 11:08 PM Reply Quote 0
                                  • V
                                    viragomann @ghazel
                                    last edited by Feb 22, 2023, 11:08 PM

                                    @ghazel
                                    Seem a bit mysterious. Can't really believe.

                                    Did you check the points already, which @SteveITS mentioned above?
                                    I also suspect that the access is blocked by the destination device itself. This is the default behavior of an operating systems firewall.

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      ghazel @SteveITS
                                      last edited by Feb 23, 2023, 8:11 AM

                                      @steveits said in LAN access from VPN:

                                      @ghazel but there is a rule on the VPN interface allowing access to lan?

                                      Usually it’s:
                                      Missing fw rule in arriving interface

                                      Arriving interface (WG_VPN) has an 'Allow Any' rule.

                                      Device fw doesn’t allow different subnet

                                      Device fw is not enabled. (behavior is the same even with it enabled, since the source IP of the packets is 192.168.1.2 -- inside the subnet)

                                      Device not using pfSense as gateway

                                      Device is using pfSense 192.168.1.1 as a gateway.

                                      @viragomann said in LAN access from VPN:

                                      @ghazel
                                      Seem a bit mysterious. Can't really believe.

                                      Maybe the Netgear is still doing source IP rewriting for sources that are outside the subnet?

                                      I also suspect that the access is blocked by the destination device itself. This is the default behavior of an operating systems firewall.

                                      Operating system firewall is off. Wireshark is seeing the packets and the responses.

                                      V 1 Reply Last reply Feb 23, 2023, 8:38 AM Reply Quote 0
                                      • V
                                        viragomann @ghazel
                                        last edited by Feb 23, 2023, 8:38 AM

                                        @ghazel said in LAN access from VPN:

                                        Maybe the Netgear is still doing source IP rewriting for sources that are outside the subnet?

                                        It can do this only on traffic which passes through it.

                                        Operating system firewall is off. Wireshark is seeing the packets and the responses.

                                        Can you post this capture and tell us, on which device and NIC it was taken.

                                        G 1 Reply Last reply Feb 23, 2023, 8:54 AM Reply Quote 0
                                        • G
                                          ghazel @viragomann
                                          last edited by ghazel Feb 23, 2023, 8:54 AM Feb 23, 2023, 8:54 AM

                                          @viragomann said in LAN access from VPN:

                                          @ghazel said in LAN access from VPN:

                                          Maybe the Netgear is still doing source IP rewriting for sources that are outside the subnet?

                                          It can do this only on traffic which passes through it.

                                          The traffic is passing through it. Internet > WG_VPN > LAN > Netgear > 192.168.1.16

                                          Operating system firewall is off. Wireshark is seeing the packets and the responses.

                                          Can you post this capture and tell us, on which device and NIC it was taken.

                                          pfSense_LAN.cap
                                          192.168.1.16_en6.pcapng

                                          Uploaded capture from pfSense on LAN interface 192.168.1.1 90:ec:77:32:cb:ad (which is plugged into the Netgear, 192.168.1.2 3c:37:86💿fc:ae) and capture from target machine en6 192.168.1.16 8c:ae:4c:dd:4a:91 (plugged into that Netgear).

                                          V 1 Reply Last reply Feb 23, 2023, 11:07 AM Reply Quote 0
                                          2 out of 26
                                          • First post
                                            2/26
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.