Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem configuration OpenVPN

    Scheduled Pinned Locked Moved OpenVPN
    42 Posts 4 Posters 11.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kilian77 @Gertjan
      last edited by

      @gertjan the 2 ports of the pfsense must not be in the same subnet, so I put my WAN pfsense = 192.168.50.1 and my LAN PFSENSE = 192.168.1.2

      My LAN = 192.168.1.1

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @kilian77
        last edited by

        @kilian77 said in Problem configuration OpenVPN:

        @gertjan the 2 ports of the pfsense must not be in the same subnet

        I know ;)

        He didn't know that : this breaks everything :

        af6efdd3-db5d-4a07-a420-2459c436d494-image.png

        @gertjan said in Problem configuration OpenVPN:

        What is the IP of the LAN of the upstream router ??

        ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        K 1 Reply Last reply Reply Quote 0
        • K
          kilian77 @Gertjan
          last edited by

          @gertjan
          I made changes since my last messages here are my addresses:

          a4a1fe91-c285-4ff1-ad21-e55ee010bb0e-image.png
          My LAN IP of my router is 192.168.1.1

          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @kilian77
            last edited by Gertjan

            @kilian77

            That is as bad as it was before. So nothings works right now, and that's 'normal'.

            I'll explain.

            You already figured out that when you buy a connected device, like a router, they nearly all have "192.168.1.1/24" as a LAN interface.
            This means you can not 'chain' these devices one after and presume it will work.
            It won't work.

            One solution- two methods :

            You change the default LAN network of your ISP router from 192.168.1.1/24 to, for example, 192.168.50.1/24 (or 192.168.2.1/24 or something like that). Keep in mind that you change all other related settings, like for example the DHCP server for the LAN interface (if applicable).

            Or

            You change the default LAN network of your pfSense router from 192.168.1.1/24 to, for example, 192.168.50.1/24 (or 192.168.2.1/24 or something like that). Keep in mind that you change all other related settings, like for example the DHCP server for the LAN interface.

            You can keep (I strongly suggest) the default WAN settings : that is : "DHCP" for IPv4 for pfSense. Static IPv4 on for WAN is for experts and ..... well, don't do static, please.

            If you can create a MAC based DHCP lease setting on your ISP router for pfSense, then do so.
            Because you are natting on your ISP router, you better make sure that pfSense always obtains the same IP.

            Btw : these 'rules' or 'this knowledge' has nothing to do with your ISP router, or pfSense.
            As soon as you you 'chain' one router after another, you have to make sure that they all use a distinct LAN 1RFD1918 network.
            Otherwise you will break routing.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            K 1 Reply Last reply Reply Quote 0
            • K
              kilian77 @Gertjan
              last edited by

              @gertjan I'm sorry I'm a beginner in the matter and there are a few points that I don't understand, why should I modify the LAN address of my ISP router and also modify that of the Pfsense LAN, if they remain in the same network?
              Also if I put the WAN address in DHCP it assigns me an address in the same subnet as my router.
              Thank you for your answer

              GertjanG 2 Replies Last reply Reply Quote 1
              • GertjanG
                Gertjan @kilian77
                last edited by

                @kilian77 said in Problem configuration OpenVPN:

                router and also modify

                One ๐Ÿ‘ for you !

                I omitted the "Or" word : I'll edit my post above.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @kilian77
                  last edited by Gertjan

                  @kilian77

                  @kilian77 said in Problem configuration OpenVPN:

                  I'm a beginner in the matter

                  We're all born with zero knowledge about all this stuff.
                  Me, for example, wasn't even able to wipe my own .... well, you get it.

                  I'll show you what I did.
                  As I have somewhat the same setup as you.

                  My pfSense "LAN" is identical as the one when it came 'out of the box", that is : when you install it :

                  728c93c5-0b90-451d-b12a-d5756c70d5ca-image.png

                  and the DHCP server page shows the same info :

                  505fe421-8160-48af-9393-e9e08f4264a1-image.png

                  My pfSense WAN network setup is 'default' : I use 'DHCP' :

                  ed4e12df-28b7-4197-93e8-6da7a0022a6b-image.png

                  BUT I had to change my ISP router setup, as it's LAN also comes with 192.168.1.0/24 :
                  I changed it to 192.168.10.0/24 :
                  I've set the LAN IP of my ISP router to "192.168.10.1:"

                  8319596e-f8f5-4ebe-afce-328b6cc540de-image.png

                  (sorry, the box shows french words, probably becuse I'm in France ;) )
                  ( Livebox is the 'name' of my router - dono why)

                  I made sure that the device (I call it "pfSense") with MAC 90:EC:77:29:39:xx always obtains the IP 192.168.10.4.

                  e02aae0f-54a4-4818-966b-b1f867f8370e-image.png

                  I created a NAT rule in my ISP box, so port 1194 protocol UDP is natted to the device 'pfSense', which is 192.168.10.4

                  125029c4-ac24-4fae-9a8b-caac0729c868-image.png

                  At this moment, when I hit my ISP router's WAN port - which uses my 'Internet' IP on port 1194, with protocol 1194, that traffic will get send to 192.168.10.4:1194.

                  On the pfSense side, when you use the OpenVPN server create Wizard, the wizard will create a firewall rule (a NAT rule is not applicable / not needed because the endpoint is pfSense itself).

                  97956830-5c88-4434-80e3-36199f47f63b-image.png

                  When I connect everything I see this :

                  0e407a65-7ae1-4112-80f7-7fc46daea9e3-image.png

                  You can see that my ISP router gave 192.168.10.4 to the WAN IP of pfSense.
                  It will always have this same IP, this is important, as if it got another IP in the 192.168.10.x/24 range, that could break 1194/UDP forwarding == the ISP router's NAT rule.

                  You see also a lot of IPv6 info, as I mostly use IPv6 these days.
                  IPv6 is a bit like IPv6, packets, ports and stuff, and made easier as IPv4. You need a degree in rocket science to make it work ๐Ÿ˜Š
                  ( just keep it for later)

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  K 2 Replies Last reply Reply Quote 0
                  • K
                    kilian77 @Gertjan
                    last edited by

                    @gertjan Thanks for your help,
                    I'll test tomorrow and I'll come back to you for an update

                    1 Reply Last reply Reply Quote 0
                    • K
                      kilian77 @Gertjan
                      last edited by

                      @gertjan @gertjan Hello again, I'm coming back to you because I had the opportunity to do some tests again today and it's not better than before.

                      I reset everything to start on a new configuration to follow what you told me.

                      I have my LAN at 192.168.1.1 with the same DHCP as you, for the WAN I have
                      my address in 192.168.10.22 assigned in DHCP by my box and I changed the LAN network of my router to 192.168.10.1

                      I also created a static DHCP address for the pfsense and a nat rule for
                      the UDP protocol.
                      I re-created a CA and a certificate as well as a VPN server and a user but I still have the same error which is starting to drive me crazy.
                      307f077c-0852-4971-99e6-aef397d2f304-image.png

                      c3bcbfaf-d656-4636-822d-c2e2743b9880-image.png

                      wan.PNG
                      lan.PNG
                      DHCP.PNG

                      K GertjanG 2 Replies Last reply Reply Quote 0
                      • K
                        kilian77 @kilian77
                        last edited by

                        @kilian77 I realized without doing it on purpose that if I did the wifi test my configuration worked, so the problem may be coming from my router?

                        1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @kilian77
                          last edited by Gertjan

                          @kilian77 said in Problem configuration OpenVPN:

                          I have my LAN at 192.168.1.1 with the same DHCP as you, for the WAN I have
                          my address in 192.168.10.22 assigned in DHCP by my box and I changed the LAN network of my router to 192.168.10.1

                          If this 'router' is your ISP router, then, yes, ok.
                          Keep in mind : pfSense is also just a 'router'.

                          Your Livebox setting look ok to me :
                          I have :

                          7ad73648-bfc6-4355-9dd5-61b2ffeba7b0-image.png

                          My pfSense uses 192.168.10.4 (yours 192.168.10.22).
                          "90:EC:77:29:39:2A" is the MAC of my pfSense WAN NIC.

                          I can see that my Livebox (ISP router) NATs traffic that comes into my ISP router's WAN port, with destination 'port 1194' and protocol UDP, to the WAN IP 192.168.10.4, my pfSense WAN.
                          In pfSense, it matches the first rule :

                          1149f568-ef94-4faa-9f5f-67db4ee98edf-image.png

                          so the traffic enters 'pfSense' , and there, in pfSense, on the WAN interface, the openvpn process welcomes these packets as it set iself up as process listening on WAN, port 1194, protocol UDP.

                          @kilian77 said in Problem configuration OpenVPN:

                          I realized without doing it on purpose that if I did the wifi test my configuration worked, so the problem may be coming from my router?

                          When testing, use, for example, a Phone, and stop the Wifi. Use 4G/3G only.
                          Use the WAN IPv4 of your Livebox as a destination.

                          eb96367a-cc0a-4064-8e0b-9d499f8b4ccc-image.png

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          K 1 Reply Last reply Reply Quote 0
                          • K
                            kilian77 @Gertjan
                            last edited by

                            @gertjan As you can see, on my side the traffic does not pass : e55cdc4d-55b8-46b6-b10f-0c9e046d0bd8-image.png
                            but also when you tell me to use the WAN of my livebox, I inform it where?

                            GertjanG 1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan @kilian77
                              last edited by

                              @kilian77 said in Problem configuration OpenVPN:

                              the traffic does not pass

                              It's not 'does not pas'.

                              See for yourself :

                              Check :

                              85ade6e2-b93f-43a0-9269-b1f9fb4042f2-image.png

                              and re try.

                              Now check the

                              a7984bb6-37fa-479e-9998-4906a80055ec-image.png

                              do you see any packets blocked on the WAN ?
                              Probably not.

                              Check the packet counter hit box of the firewall rule on your WAN :

                              2a4b2bd1-a241-4dd8-bc50-6409bea3ae6a-image.png

                              If it's 0/0 then tat means : nothing ever reached the WAN interface of pfSense.

                              Maybe stupid, but important : pfSense can not pass or block what doesn't even reach pfSense.

                              What is your WAN IP (mask the last digit) ? VSDL ? ADSL ? Orange Fibre ?

                              I've being NATting my Livebox 4 adsl, 5 (Pro) adsl and now 6 (Pro) using fibre, for years.
                              It works.

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              K 1 Reply Last reply Reply Quote 0
                              • K
                                kilian77 @Gertjan
                                last edited by

                                @gertjan hello, without having done anything I am no longer at 0

                                57131d10-b576-416b-8345-ee4f4fe2d044-image.png

                                6e91fe5d-390a-43da-9af8-e5d69d09a2f8-image.png

                                I use a livebox 4 or a livebox Pro V4 both in fiber.

                                GertjanG 1 Reply Last reply Reply Quote 0
                                • GertjanG
                                  Gertjan @kilian77
                                  last edited by

                                  @kilian77

                                  Who is 192.168.1.111 ?? Who is this ? a pfSense LAN (right ??) device - why should it connect to the pfSense WAN ?? Going 'out' to get back in ? To where ? to some pfSense LAN device ? The device 192.168.1.111 is already on the pfSense LAN, and it can connect to every device without the need to 'pass by pfSense'.

                                  Tip of the day : make the OpenVPN pas rule log :

                                  6572fc02-4179-4c64-82c0-29b5ff65857c-image.png

                                  =>

                                  f3b5e9e7-3034-4c38-a973-1e059fac061f-image.png
                                  Now you can see what / who is using the OpenVPN pass rule.

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  K 1 Reply Last reply Reply Quote 0
                                  • K
                                    kilian77 @Gertjan
                                    last edited by

                                    @Gertjan Hello, sorry for this late return, I was absent, suddenly in my logs you can always see that there are lots of things and my public ip is 92.170.84.1XX.

                                    I added the option for the logs but the rule fell back to 0/0 B.

                                    fd2ac9fa-79a7-4017-b835-ff3befbfde8b-image.png

                                    GertjanG 1 Reply Last reply Reply Quote 0
                                    • GertjanG
                                      Gertjan @kilian77
                                      last edited by Gertjan

                                      @kilian77

                                      pfSense uses 192.168.10.22 - and it obtained this IP using DHCP.
                                      I was given to pfSense by your Livebox.

                                      You have other devices connected to the Livebox : why ?
                                      I've only one device connected ** : pfSense. So nothing tries to connect to my pfSense from 'the outside'.

                                      ** : ok, I've one other device : the Orange TV box - but that box only connects to the outside world (the Internet : the Orange TV servers), and it's nothing roaming around locally, on its LAN.

                                      So : 192.168.10.9 - 192.168.10.10 - 192.168.10.3 : these are local broadcasts on there Livebox LAN, the pfSense WAN sees these inoffensive packets and blocks them.

                                      Consider stopping the logging of the "Default deny rule IPv4", as it logs just broadcast noise.

                                      No "help me" PM's please. Use the forum, the community will thank you.
                                      Edit : and where are the logs ??

                                      K 1 Reply Last reply Reply Quote 0
                                      • K
                                        kilian77 @Gertjan
                                        last edited by

                                        @Gertjan
                                        ok but i still don't understand what is blocking my vpn

                                        GertjanG 1 Reply Last reply Reply Quote 0
                                        • GertjanG
                                          Gertjan @kilian77
                                          last edited by

                                          @kilian77
                                          Your WAN firewall rule (placed at the top - f you have more then one WAN rule) is logging ?
                                          Do the counters go up ?

                                          If : no logs and/or the counters stay the same : that means traffic isn't reaching pfSense.

                                          You can also test with this :
                                          The pfSense packet capture :

                                          ad9b1628-4e1d-4b38-be96-64568f4a5f28-image.png

                                          I've selected my WAN (ix3), protocol UDP, and port 1194.
                                          I wanted '10' packets.
                                          The result was shown in a couple of seconds, as I was the using OpenVPN server at that moment => I had to use OpenVPN to connect to my 'work' Livebox, as pfSense to do this test ;)

                                          So : can you capture traffic ?
                                          If not : check Livebox.

                                          This is probably not needed, but I've set it :

                                          20fd5ab9-443b-4eee-97c9-318439657e53-image.png

                                          as pfSense is my only Livebox LAN device, I asked Livebox to redirect all incoming traffic to the DMZ : pfSense3

                                          No "help me" PM's please. Use the forum, the community will thank you.
                                          Edit : and where are the logs ??

                                          K 1 Reply Last reply Reply Quote 0
                                          • K
                                            kilian77 @Gertjan
                                            last edited by kilian77

                                            @Gertjan Hello

                                            851f94dd-ebdc-4d1a-9210-2fb87481c9e6-image.png

                                            I see that when I capture.
                                            The problem can come from the firewall of the ISP router

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.