Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    openvpn site to site cannot access remote pfsense router

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rampuse
      last edited by rampuse

      hello,
      i have setup openvpn site to site tunnel. i have set tunnel address to 172.55.55.0/30 on both sides. both sides are using pfsense on a x86 pcs.
      i can ping from client side (NOT static ip. mostly cgnat by isp. pfsense pc is in lan subnet of main router) the other pfsense server.
      i am not doing any extra vpn things on any machines. i am purely using the two pfsense machines to create a site to site connection. i want the pcs connected to one pfsense's subnet to access the other pfsense's sunbet pcs. both machines have dhcp as their wan (since main gateway routers are different). i have port forwarded the port from the main gateway to the pfsense machine on the server side.
      i ahve setup opnvpn "interface" on both siddes.
      i have setup allow rules in the firewall tab on both machines.
      the server and client are both connected to each other thru the tunnel.
      Problem--> i cannot open the main pfsense server interface via the web browser from the client subnet machines. i can ping it BUT not open its interface via web browser!!!

      BTW i am completely new to networking and pfsense and firewalls. i dont use the cmd to setup anything. i used the gui of pfsense to setup everything. complete newbie to firewalls and pfsense.

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @rampuse
        last edited by

        @rampuse said in openvpn site to site cannot access remote pfsense router:

        i can ping it BUT not open its interface via web browser!!!

        What do you get in the browser exactly?

        i want the pcs connected to one pfsense's subnet to access the other pfsense's sunbet pcs.

        Is this working already?

        Are the local network devices on either side connected to pfSense LAN or are they directly connected to the main router?

        Which local subnets to you use?
        Show the routing table of both pfSense. Diagnostic > Routes

        R 1 Reply Last reply Reply Quote 0
        • R
          rampuse @viragomann
          last edited by

          @viragomann
          the browser is just blank:
          "This site can’t be reached
          192.168.7.7 took too long to respond."

          the local network devices are connected to pfsense lan.

          BTW i reset BOTH pfsenses to factory defaults, BUT same issue. this time i did NOT create the "interface" s
          smb share from one subnet to other subnet are working fine!!!!!!!
          just the pfsense webpage doesnt open in browser!!!!!!!!

          subnet on server side: 192.168.7.0/24
          subnet on client side: 192.168.2.0/24

          routing table of server:
          server routes.jpg

          routing table of client:
          client routes.jpg .

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @rampuse
            last edited by

            @rampuse said in openvpn site to site cannot access remote pfsense router:

            "This site can’t be reached
            192.168.7.7 took too long to respond."

            So the browser doesn't get a response like the access was blocked by the server.
            That's weird, as you can access smb shares on the server site. So I assume that you have allowed at least TCP from 192.168.2.0/24 to 192.168.7.0/24 on the VPN interface.

            Anyway, something in the firewall log?
            Maybe enable the logging in all related rules.
            Do you have floating block rules, which match this traffic by any chance?

            R 1 Reply Last reply Reply Quote 0
            • R
              rampuse @viragomann
              last edited by rampuse

              @viragomann
              Now i have configured NEW tunnel/VPN with ssl/tls method. this tunnel simply cannot ping the remote server. the setup is same. this time also the both sides have got/assigned a tunnel ip of 172.55.55.1 and all. but i cannot ping the other side!!!!! no smb either this time. cannot ping the other lans pcs!!!!! this time i have also created a openvpn 'interface' on client side. still no luck............
              i just followed the netgate documentation to create the vpn.

              server side routes:

              llllllll.jpg

              server side dashbaord:

              pppppppp.jpg

              client side routes:

              ttttt.jpg

              client side dashboard:

              dashboard.jpg

              should i do anything in firewall > rules > floating ???????? it is currently just at default.

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @rampuse
                last edited by

                @rampuse
                Set the tunnel network mask to /30 on the server.

                There is no need to assign interfaces to the OpenVPN instances as long as you don't need to policy route traffic to the other site or forward public traffic to the remote site.

                Firewall rules are needed on all incoming interfaces. Either on the interfaces which you've assigned especially or on the OpenVPN tab.
                And also on the LAN.
                E.g. to access from site A LAN to B LAN you need a proper rule at A on LAN and at B on the VPN interface.

                Consider the OpenVPN rule tab is an interface group for all OpenVPN instances. Rules you add there are applied to all incoming vpn traffic in case it matches.

                R 1 Reply Last reply Reply Quote 0
                • R
                  rampuse @viragomann
                  last edited by

                  @viragomann
                  the server side dashboard shows under 'client instance statistics' the remote/virtual ip as '172.55.55.1' and the same on client side shows '172.55.55.2'
                  is this correct/ok?
                  client dashboard:
                  egggef.jpg

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @rampuse
                    last edited by

                    @rampuse
                    Yes, that's ok. The server takes the first IP in the tunnel subnet, the first client gets the next one.

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      rampuse @viragomann
                      last edited by

                      @viragomann
                      it seems i found the problem. i just changed the following settings and now everything works!!! :
                      changed tunnel address from /30 to /31
                      added 'concurrent connections' as '1'
                      now ssl works.
                      also did wireguard site2site. it also wasnt working TILL i did tunnel address as /31

                      now everything works!!
                      thus, for site 2 site, the tunnel address HAS to be a /31 !!!

                      R 1 Reply Last reply Reply Quote 1
                      • R
                        rampuse @rampuse
                        last edited by

                        @rampuse thanks for everyone who tried to help

                        1 Reply Last reply Reply Quote 0
                        • RicoR
                          Rico LAYER 8 Rebel Alliance
                          last edited by

                          Using public IP space in private networks is a bad idea ("172.55.55.0 - 172.55.55.255 is an IP address range owned by T-Mobile USA, Inc. and located in United States").

                          -Rico

                          R 1 Reply Last reply Reply Quote 1
                          • R
                            rampuse @Rico
                            last edited by

                            @Rico
                            WTF !! I thought 10. AND 172. AND 192. are ALL private ranges. need to search the net for some clarification/info.

                            1 Reply Last reply Reply Quote 0
                            • RicoR
                              Rico LAYER 8 Rebel Alliance
                              last edited by

                              10.0.0.0/8 (255.0.0.0) [10.0.0.0 – 10.255.255.255]
                              172.16.0.0/12 (255.240.0.0) [172.16.0.0 – 172.31.255.255]
                              192.168.0.0/16 (255.255.0.0) [192.168.0.0 – 192.168.255.255]

                              https://en.wikipedia.org/wiki/Private_network

                              -Rico

                              1 Reply Last reply Reply Quote 2
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.