Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN Remote users are able to access Router but not hosts on local network

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      gizmobrat
      last edited by

      Hello,

      I have set up OpenVPN to connect to my network with a split tunnel VPN. OpenVPN creates a connection and I am able to access the router at 10.0.0.1 but is unable to access any hosts. I have the following configurations.

      • list itemLocal network 10.0.0.0/24

      • Remote access (SSl/TLS)

      • tun - Layer 3

      • TCP on IPV4

      • Local port 1194

      • IPv4 Tunnel Network 10.0.2.0/24

      • IPv4 Local Networks 10.0.0.0/24

      • Dynamic IP selected

      • Topology set to subnet

      • OpenVPN (ovpns1) Interface enabled

      • Firewall set to allow IPv4 on port 1194 Wan interface to pass (created by wizard)

      • No VLANS

      • No Bridges are set

      On my remote Windows 10 machine I am assigned an IP address of 10.0.2.2 under OpenVPN Tap-Windows with no Gateway.

      Any help is appreciated,

      gizmobrat

      D V 2 Replies Last reply Reply Quote 0
      • D
        Daniel_Hyde @gizmobrat
        last edited by

        @gizmobrat

        You need to create Firewall rules in the OpenVPN tab

        Thanks
        Dan

        G 1 Reply Last reply Reply Quote 0
        • G
          gizmobrat @Daniel_Hyde
          last edited by

          @daniel_hyde

          Under Firewall/Rules/OpenVPN I have a rule with Pass on OpenVPNInterface. Allowing IPv4 with any protocol from any Source and destination.
          -Douglas

          1 Reply Last reply Reply Quote 0
          • V
            viragomann @gizmobrat
            last edited by

            @gizmobrat
            Assumed that OpenVPN server is running on the default gateway, check if the destination device's firewall allows access from outside of its subnet.

            G 1 Reply Last reply Reply Quote 0
            • G
              gizmobrat @viragomann
              last edited by gizmobrat

              @viragomann
              I am not able to reach any devices on the 10.0.0.0/24 subnet with the exception of the router. I am unable to reach any of the hosts even with Firewalls disabled on both remote host and host on the network. This leads me to believe that either I need to set a default gateway on the VPN or I need to set up a way to route traffic between the two local networks. Any Ideas?

              Thanks
              gizmobrat

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @gizmobrat
                last edited by

                @gizmobrat
                Can you confirm that the remote pfSense running the server is the default gateway in the remote network?

                Also ensure that the local network is not overlapping with the remoute.
                Maybe you can post the clients route table for verification.

                If that's given sniff the traffic on the remote LAN interface with packet capture on pfSense, while you try to access a remote device from the client to see if the packets are passed through.

                G 1 Reply Last reply Reply Quote 0
                • G
                  gizmobrat @viragomann
                  last edited by

                  @viragomann
                  The PF sense router is the device that is running the OpenVPN server.
                  The local network is 10.0.0.0/24 on the Lan Interface 10.0.0.1 is he default gateway
                  The VPN Network is 10.0.2.0/24 on the OpenVPN interface.
                  The remote network is 192.168.1.1

                  Below is the remote Windows 10 route table and IPconfig

                  IPv4 Route Table
                  ===========================================================================
                  Active Routes:
                  Network Destination        Netmask          Gateway       Interface  Metric
                            0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.174     25
                           10.0.0.0    255.255.255.0         10.0.2.1         10.0.2.2    281
                           10.0.2.0    255.255.255.0         On-link          10.0.2.2    281
                           10.0.2.2  255.255.255.255         On-link          10.0.2.2    281
                         10.0.2.255  255.255.255.255         On-link          10.0.2.2    281
                          127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
                          127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
                    127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
                        192.168.1.0    255.255.255.0         On-link     192.168.1.174    281
                      192.168.1.174  255.255.255.255         On-link     192.168.1.174    281
                      192.168.1.255  255.255.255.255         On-link     192.168.1.174    281
                       192.168.56.0    255.255.255.0         On-link      192.168.56.1    281
                       192.168.56.1  255.255.255.255         On-link      192.168.56.1    281
                     192.168.56.255  255.255.255.255         On-link      192.168.56.1    281
                          224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
                          224.0.0.0        240.0.0.0         On-link      192.168.56.1    281
                          224.0.0.0        240.0.0.0         On-link     192.168.1.174    281
                          224.0.0.0        240.0.0.0         On-link          10.0.2.2    281
                    255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
                    255.255.255.255  255.255.255.255         On-link      192.168.56.1    281
                    255.255.255.255  255.255.255.255         On-link     192.168.1.174    281
                    255.255.255.255  255.255.255.255         On-link          10.0.2.2    281
                  ===========================================================================
                  Persistent Routes:
                    None
                  
                  Windows IP Configuration
                  
                  
                  Unknown adapter OpenVPN Wintun:
                  
                     Media State . . . . . . . . . . . : Media disconnected
                     Connection-specific DNS Suffix  . :
                  
                  Ethernet adapter Ethernet 2:
                  
                     Connection-specific DNS Suffix  . :
                     Link-local IPv6 Address . . . . . : fe80::9dad:46f6:ba7f:13fc%6
                     IPv4 Address. . . . . . . . . . . : 192.168.1.174
                     Subnet Mask . . . . . . . . . . . : 255.255.255.0
                     Default Gateway . . . . . . . . . : 192.168.1.1
                  
                  Ethernet adapter Ethernet 3:
                  
                     Connection-specific DNS Suffix  . :
                     Link-local IPv6 Address . . . . . : fe80::679f:839e:efa0:54a9%23
                     IPv4 Address. . . . . . . . . . . : 192.168.56.1
                     Subnet Mask . . . . . . . . . . . : 255.255.255.0
                     Default Gateway . . . . . . . . . :
                  
                  Unknown adapter OpenVPN TAP-Windows6:
                  
                     Connection-specific DNS Suffix  . :
                     Link-local IPv6 Address . . . . . : fe80::fe25:85c2:b1b1:e166%29
                     IPv4 Address. . . . . . . . . . . : 10.0.2.2
                     Subnet Mask . . . . . . . . . . . : 255.255.255.0
                     Default Gateway . . . . . . . . . :
                  
                  Wireless LAN adapter Wi-Fi 2:
                  
                     Media State . . . . . . . . . . . : Media disconnected
                     Connection-specific DNS Suffix  . :
                  
                  Wireless LAN adapter Local Area Connection* 11:
                  
                     Media State . . . . . . . . . . . : Media disconnected
                     Connection-specific DNS Suffix  . :
                  
                  Wireless LAN adapter Local Area Connection* 12:
                  
                     Media State . . . . . . . . . . . : Media disconnected
                     Connection-specific DNS Suffix  . :
                  
                  Ethernet adapter Bluetooth Network Connection 2:
                  
                     Media State . . . . . . . . . . . : Media disconnected
                     Connection-specific DNS Suffix  . :
                  

                  When Running packet sniff on the PF sense on the OpenVPN interface I can see 10.0.2.2 (Remote windows 10) on the VPN interface but not on the LAN interface when running a ping for 10.0.0.250.

                  -Douglas

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @gizmobrat
                    last edited by

                    @gizmobrat
                    The client side route look well. No conflict there to see.

                    When Running packet sniff on the PF sense on the OpenVPN interface I can see 10.0.2.2 (Remote windows 10) on the VPN interface but not on the LAN interface when running a ping for 10.0.0.250.

                    So we are back at the firewall rules. The pinged IP is existing, I guess, and you can ping it from pfSense itself?
                    You said you ran the wizard. This should have added a rule on the OpenVPN tab allowing any source to any destination. Can you verify this?

                    Or maybe can you see any blocks in the firewall logs?

                    G 2 Replies Last reply Reply Quote 0
                    • G
                      gizmobrat @viragomann
                      last edited by

                      @viragomann
                      10.0.0.250 is the file server and it can be pinged from PFSense and from local devices. I have attached screenshots of the Firewall rules dealing with OpenVPN. Going to start looking at logs now.

                      7261c8fe-ee0e-495e-b563-789310af3cf2-image.png

                      ae4cd39f-378e-4862-b04e-aef6b1f33919-image.png
                      3dc88429-7306-4912-8b14-e8f1fe88052f-image.png

                      V 1 Reply Last reply Reply Quote 0
                      • G
                        gizmobrat @viragomann
                        last edited by gizmobrat

                        @viragomann
                        Looking through the logs, I am seeing the following items being blocked on destination 10.0.2.2.

                        b28b1e31-e792-4b27-85de-8c3e5030ae2e-image.png

                        1 Reply Last reply Reply Quote 0
                        • V
                          viragomann @gizmobrat
                          last edited by

                          @gizmobrat
                          The rule on OpenVPN only allows TCP. So it doesn't match to ping.
                          However, since you have assigned the OpenVPNInterface to the server, where the rule allows any, ping should be allowed though.

                          Note that OpenVPN is an interface group. It includes all OpenVPN instances running on the machine.
                          Rules on interface groups a probed before one on the member interface. Hence such rule have priority.

                          When you ping 10.0.0.250 from pfSense, change the source to the OpenVPN server and check if you get still responses.

                          G 1 Reply Last reply Reply Quote 0
                          • G
                            gizmobrat @viragomann
                            last edited by

                            @viragomann
                            When pinging from the OpenVPN Interface I get 100% packet loss. So will this be a firewall or a routing error?

                            Secondly under Interfaces/Interface Groups I am seeing no groups.

                            V 1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @gizmobrat
                              last edited by

                              @gizmobrat said in OpenVPN Remote users are able to access Router but not hosts on local network:

                              @viragomann
                              When pinging from the OpenVPN Interface I get 100% packet loss. So will this be a firewall or a routing error?

                              I suspect, it is. But on the server side. Either the destination device blocks the ping or it routes responses to anywhere else than back to pfSense.
                              Are you sure it has pfSense set as default gateway?

                              Secondly under Interfaces/Interface Groups I am seeing no groups.

                              You can see custom groups only there. OpenVPN is implicitly added by pfSense.
                              But that shouldn't matter so far.
                              You wouldn't need to assign an interface to the server for your purposes. It's only needed for policy routing or alike.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.