Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem configuration OpenVPN

    Scheduled Pinned Locked Moved OpenVPN
    42 Posts 4 Posters 12.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kilian77 @Gertjan
      last edited by

      @gertjan Thanks for your help,
      I'll test tomorrow and I'll come back to you for an update

      1 Reply Last reply Reply Quote 0
      • K
        kilian77 @Gertjan
        last edited by

        @gertjan @gertjan Hello again, I'm coming back to you because I had the opportunity to do some tests again today and it's not better than before.

        I reset everything to start on a new configuration to follow what you told me.

        I have my LAN at 192.168.1.1 with the same DHCP as you, for the WAN I have
        my address in 192.168.10.22 assigned in DHCP by my box and I changed the LAN network of my router to 192.168.10.1

        I also created a static DHCP address for the pfsense and a nat rule for
        the UDP protocol.
        I re-created a CA and a certificate as well as a VPN server and a user but I still have the same error which is starting to drive me crazy.
        307f077c-0852-4971-99e6-aef397d2f304-image.png

        c3bcbfaf-d656-4636-822d-c2e2743b9880-image.png

        wan.PNG
        lan.PNG
        DHCP.PNG

        K GertjanG 2 Replies Last reply Reply Quote 0
        • K
          kilian77 @kilian77
          last edited by

          @kilian77 I realized without doing it on purpose that if I did the wifi test my configuration worked, so the problem may be coming from my router?

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @kilian77
            last edited by Gertjan

            @kilian77 said in Problem configuration OpenVPN:

            I have my LAN at 192.168.1.1 with the same DHCP as you, for the WAN I have
            my address in 192.168.10.22 assigned in DHCP by my box and I changed the LAN network of my router to 192.168.10.1

            If this 'router' is your ISP router, then, yes, ok.
            Keep in mind : pfSense is also just a 'router'.

            Your Livebox setting look ok to me :
            I have :

            7ad73648-bfc6-4355-9dd5-61b2ffeba7b0-image.png

            My pfSense uses 192.168.10.4 (yours 192.168.10.22).
            "90:EC:77:29:39:2A" is the MAC of my pfSense WAN NIC.

            I can see that my Livebox (ISP router) NATs traffic that comes into my ISP router's WAN port, with destination 'port 1194' and protocol UDP, to the WAN IP 192.168.10.4, my pfSense WAN.
            In pfSense, it matches the first rule :

            1149f568-ef94-4faa-9f5f-67db4ee98edf-image.png

            so the traffic enters 'pfSense' , and there, in pfSense, on the WAN interface, the openvpn process welcomes these packets as it set iself up as process listening on WAN, port 1194, protocol UDP.

            @kilian77 said in Problem configuration OpenVPN:

            I realized without doing it on purpose that if I did the wifi test my configuration worked, so the problem may be coming from my router?

            When testing, use, for example, a Phone, and stop the Wifi. Use 4G/3G only.
            Use the WAN IPv4 of your Livebox as a destination.

            eb96367a-cc0a-4064-8e0b-9d499f8b4ccc-image.png

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            K 1 Reply Last reply Reply Quote 0
            • K
              kilian77 @Gertjan
              last edited by

              @gertjan As you can see, on my side the traffic does not pass : e55cdc4d-55b8-46b6-b10f-0c9e046d0bd8-image.png
              but also when you tell me to use the WAN of my livebox, I inform it where?

              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @kilian77
                last edited by

                @kilian77 said in Problem configuration OpenVPN:

                the traffic does not pass

                It's not 'does not pas'.

                See for yourself :

                Check :

                85ade6e2-b93f-43a0-9269-b1f9fb4042f2-image.png

                and re try.

                Now check the

                a7984bb6-37fa-479e-9998-4906a80055ec-image.png

                do you see any packets blocked on the WAN ?
                Probably not.

                Check the packet counter hit box of the firewall rule on your WAN :

                2a4b2bd1-a241-4dd8-bc50-6409bea3ae6a-image.png

                If it's 0/0 then tat means : nothing ever reached the WAN interface of pfSense.

                Maybe stupid, but important : pfSense can not pass or block what doesn't even reach pfSense.

                What is your WAN IP (mask the last digit) ? VSDL ? ADSL ? Orange Fibre ?

                I've being NATting my Livebox 4 adsl, 5 (Pro) adsl and now 6 (Pro) using fibre, for years.
                It works.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                K 1 Reply Last reply Reply Quote 0
                • K
                  kilian77 @Gertjan
                  last edited by

                  @gertjan hello, without having done anything I am no longer at 0

                  57131d10-b576-416b-8345-ee4f4fe2d044-image.png

                  6e91fe5d-390a-43da-9af8-e5d69d09a2f8-image.png

                  I use a livebox 4 or a livebox Pro V4 both in fiber.

                  GertjanG 1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @kilian77
                    last edited by

                    @kilian77

                    Who is 192.168.1.111 ?? Who is this ? a pfSense LAN (right ??) device - why should it connect to the pfSense WAN ?? Going 'out' to get back in ? To where ? to some pfSense LAN device ? The device 192.168.1.111 is already on the pfSense LAN, and it can connect to every device without the need to 'pass by pfSense'.

                    Tip of the day : make the OpenVPN pas rule log :

                    6572fc02-4179-4c64-82c0-29b5ff65857c-image.png

                    =>

                    f3b5e9e7-3034-4c38-a973-1e059fac061f-image.png
                    Now you can see what / who is using the OpenVPN pass rule.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    K 1 Reply Last reply Reply Quote 0
                    • K
                      kilian77 @Gertjan
                      last edited by

                      @Gertjan Hello, sorry for this late return, I was absent, suddenly in my logs you can always see that there are lots of things and my public ip is 92.170.84.1XX.

                      I added the option for the logs but the rule fell back to 0/0 B.

                      fd2ac9fa-79a7-4017-b835-ff3befbfde8b-image.png

                      GertjanG 1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @kilian77
                        last edited by Gertjan

                        @kilian77

                        pfSense uses 192.168.10.22 - and it obtained this IP using DHCP.
                        I was given to pfSense by your Livebox.

                        You have other devices connected to the Livebox : why ?
                        I've only one device connected ** : pfSense. So nothing tries to connect to my pfSense from 'the outside'.

                        ** : ok, I've one other device : the Orange TV box - but that box only connects to the outside world (the Internet : the Orange TV servers), and it's nothing roaming around locally, on its LAN.

                        So : 192.168.10.9 - 192.168.10.10 - 192.168.10.3 : these are local broadcasts on there Livebox LAN, the pfSense WAN sees these inoffensive packets and blocks them.

                        Consider stopping the logging of the "Default deny rule IPv4", as it logs just broadcast noise.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        K 1 Reply Last reply Reply Quote 0
                        • K
                          kilian77 @Gertjan
                          last edited by

                          @Gertjan
                          ok but i still don't understand what is blocking my vpn

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @kilian77
                            last edited by

                            @kilian77
                            Your WAN firewall rule (placed at the top - f you have more then one WAN rule) is logging ?
                            Do the counters go up ?

                            If : no logs and/or the counters stay the same : that means traffic isn't reaching pfSense.

                            You can also test with this :
                            The pfSense packet capture :

                            ad9b1628-4e1d-4b38-be96-64568f4a5f28-image.png

                            I've selected my WAN (ix3), protocol UDP, and port 1194.
                            I wanted '10' packets.
                            The result was shown in a couple of seconds, as I was the using OpenVPN server at that moment => I had to use OpenVPN to connect to my 'work' Livebox, as pfSense to do this test ;)

                            So : can you capture traffic ?
                            If not : check Livebox.

                            This is probably not needed, but I've set it :

                            20fd5ab9-443b-4eee-97c9-318439657e53-image.png

                            as pfSense is my only Livebox LAN device, I asked Livebox to redirect all incoming traffic to the DMZ : pfSense3

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            K 1 Reply Last reply Reply Quote 0
                            • K
                              kilian77 @Gertjan
                              last edited by kilian77

                              @Gertjan Hello

                              851f94dd-ebdc-4d1a-9210-2fb87481c9e6-image.png

                              I see that when I capture.
                              The problem can come from the firewall of the ISP router

                              1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan
                                last edited by Gertjan

                                @kilian77

                                Well, all depends what you are the conditions of the capture.

                                But if you set up the conditions as I did : nothing reaches pfSense - so nothing to capture.
                                The OpenVPN server never receives any traffic.

                                Something to test your livebox NAT firewall skills :

                                First :
                                Can you access your pfSense from LAN using : http://192.168.10.22

                                ( and for my won curiosity : why 192.168.10.22 ? 192.168.10.1 == ok - If you have to, 192.168.10.254 - but why 10.22 ?? Strange IP like that, that smell's troubles from x miles away )

                                if so : go lvebox, and NAT port 80 TCP to 192.168.10.22.

                                From now on, with your phone - phone NOT connected to Wifi ( !! ) you can access pSense GUI from 'the Internet'.

                                Do this for testing, don't leave this Livebox NAT rule in place.

                                I just did this test on my side :

                                First : Livebox : port 80 and 443 TCP :

                                678eab59-5700-4f49-9172-770087f5e590-image.png

                                Next : pfSense : idem :

                                1be3c1bb-3c5a-4527-a611-54ade25a98ad-image.png

                                I called my neighbor, and asked if they could try http://82.127.26.10x
                                He said there was a certificate error (that's normal, as my pfSense is redirecting port 80 to port 443) but when he clicked on "Go ahead anyway" he saw the pfSense GUI.

                                Btw : if any of the other devices connected to the Livebox uses uPNP, that I can image that NATting doesn't work, as destination ports are already used by other devices : solution : de-activate uPNP.

                                Double check that your WAN IP is not some kind of NATted IP (CGNAT) .... I think Orange doesn't do that .... but anyway : check.

                                And finally, for 'reasons' Orange can 'firewall' you from their side. Never saw them doing that myself ... but, hey, why not .... we see every day something new ;)

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                K 1 Reply Last reply Reply Quote 0
                                • K
                                  kilian77 @Gertjan
                                  last edited by

                                  @Gertjan So, yes I can access the interface with the address 192.168.10.22.
                                  The address is 10.22 because I already have other devices that have IPs generated before 22, that's all.

                                  98c2b517-68f2-4244-b3e8-33cf77325b83-image.png

                                  the NAT test is inconclusive

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @kilian77
                                    last edited by

                                    @kilian77 if the wan router in front of psfsense is using 192.168.1 as its network, then pfsense wan would need an IP on the 192.168.1 network.

                                    How exactly do you have things connected.. Your showing traffic hitting your wan coming from 192.168.10 addresses..

                                    internet -- isp router -- 192.168.1 -- (wan) pfsense (lan) - 192.168.x

                                    Yes your pfsense lan has to be a different network than the wan.. But the wan has to be in the 192.168.1 network if that is the network your isp device is using..

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    K 1 Reply Last reply Reply Quote 0
                                    • K
                                      kilian77 @johnpoz
                                      last edited by

                                      @johnpoz
                                      Hello, no my ISP router is also in 192.168.10.X

                                      GertjanG johnpozJ 2 Replies Last reply Reply Quote 0
                                      • GertjanG
                                        Gertjan @kilian77
                                        last edited by

                                        @kilian77 said in Problem configuration OpenVPN:

                                        Hello, no my ISP router is also in 192.168.10.X

                                        What do you mean by 'also' ?

                                        Can you make a drawing with all the IP addresses / networks / Network names on every router side ?

                                        No "help me" PM's please. Use the forum, the community will thank you.
                                        Edit : and where are the logs ??

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @kilian77
                                          last edited by

                                          @kilian77

                                          So you changed it from the 192.168.1 it was using?

                                          Yeah a drawing would be helpful your not plugging everything into a dumb switch - ie both wan and lan?

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          K 1 Reply Last reply Reply Quote 0
                                          • K
                                            kilian77 @johnpoz
                                            last edited by

                                            @johnpoz my ISP router: 192.168.10.1
                                            my pfsense WAN port: 192.168.10.22
                                            my pfsesne LAN port: 192.168.1.1

                                            GertjanG 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.