Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    in Site-to-Site OpenVPN can not access to the client LAN from Server

    OpenVPN
    9
    23
    2.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      spittlbm @vahidmoghadam
      last edited by

      @vahidmoghadam we've struggled with something similar, so I will add this in case it helps - our iRoutes were specified in the client specific overrides advanced field rather than the tunnel settings. This was one issue for us in the 2.6 to 2.7 migration. The other was some change to the keys, so we reissued and reinstalled them.

      Now we're getting a full swap space intermittently. This is prevented by stopping the S2S/P2P OpenVPN service (not our remote access OpenVPN service) before the shell and web configurator lock up. We'll be reinstalling from scratch over the weekend since our S2S isn't mission critical.

      V 1 Reply Last reply Reply Quote 0
      • V
        vahidmoghadam @spittlbm
        last edited by

        @spittlbm
        My server's pfSense is fresh install of 2.7 but client's pfSense remain on 2.6.
        I decided to install a fresh 2.7 on the my test device as client and retry to test site to site. I will share the results.

        1 Reply Last reply Reply Quote 0
        • P
          PauloPedrozo @vahidmoghadam
          last edited by

          @vahidmoghadam Hi, any news about this router problem ? I had the same problem since we upgrade the both pfsense to 2.7 a few months ago. To downgrade is complicate. My workaround was create an openvpn remote access and install OpenVPN Windows client at a workstations(server network) that need access the workstations at client network.

          Regards

          V 1 Reply Last reply Reply Quote 0
          • V
            vahidmoghadam @PauloPedrozo
            last edited by

            @PauloPedrozo

            Unfortunately, I have not found any way to solve this problem. Even on a new machine, I installed the latest version of pfSense from scratch, but I still didn't succeed.
            Even in an example, I connected two pfSense machines to the server as clients, both clients had full access to each other and the clients had full access to the server, but still the server did not have access to any of the clients.
            It is a complex and strange problem that unfortunately.

            P 1 Reply Last reply Reply Quote 1
            • P
              PauloPedrozo @vahidmoghadam
              last edited by

              @vahidmoghadam Same here. I test some tracert

              • workstation at client network to workstation at server network = work fine
                1 1 ms 1 ms <1 ms 192.168.148.5 -> pfsense client
                2 26 ms 27 ms 27 ms 10.3.101.1 - tunnel
                3 29 ms 28 ms 25 ms 192.168.140.20 - (workstation on server network)

              • workstation at server network to workstation at server network = timeout
                1 * * * Timeout
                2 * * * Timeout
                3 * * * Timeout

              • pfsense server to workstation at client network = work fine
                1 10.3.101.0 27.440 ms 28.003 ms 27.996 ms
                2 192.168.148.20 23.889 ms 28.069 ms 27.972 ms (workstation on client network)

              The problem is when pfsense server receive a request to client network ip, the pfsense don´t redirect to tunnel. But the request is at pfsense server, it know redirect to tunnel.

              1 Reply Last reply Reply Quote 0
              • S ShaneDeak referenced this topic on
              • S
                ShaneDeak
                last edited by

                I have the same problem. In addition, I have a dual WAN setting. The pfSense sends the packets, which are actually intended for the client network, over WAN2 to the Internet.
                The pfSense can reach all clients in the client network with the OpenVPN server.

                Has anyone already found a solution for this? If even a new installation doesn't help, I guess I have to go back to 2.6.

                R 1 Reply Last reply Reply Quote 0
                • T
                  TTBruce
                  last edited by

                  Did anyone try my suggestion? That was what fixed it for me when I had this issue before. All my other settings aligned with the guide here: https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-tls.html

                  S 1 Reply Last reply Reply Quote 0
                  • G
                    geoervin
                    last edited by

                    After trying everything suggested I found a solution: there was a dual Wan setup that was only operating as a single. I didn't need it so fully removing the dual wan setup returned full function of the site to site connection.

                    P 1 Reply Last reply Reply Quote 0
                    • P
                      PauloPedrozo @geoervin
                      last edited by

                      @TTBruce I used this tutorial to create our site2site VPN :)

                      @geoervin I have 2 WANs, I think that it's "the problem". But I can´t remove, I need the both WANs. :(

                      T 1 Reply Last reply Reply Quote 0
                      • T
                        TTBruce @PauloPedrozo
                        last edited by TTBruce

                        @PauloPedrozo So did I, but I still had the same issue until I explicitly defined the IP in the tunnel network field on the client specific override (eg. 192.168.250.2/24 in the OP example)

                        1 Reply Last reply Reply Quote 0
                        • S
                          ShaneDeak @TTBruce
                          last edited by

                          @TTBruce said in in Site-to-Site OpenVPN can not access to the client LAN from Server:

                          Did anyone try my suggestion? That was what fixed it for me when I had this issue before. All my other settings aligned with the guide here: https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-tls.html

                          I tried, but unfortunately it did not work. I even swapped client and server. Now it is the client side (the one with dual WAN) that does not reach the server side.

                          1 Reply Last reply Reply Quote 0
                          • R
                            Rossi @ShaneDeak
                            last edited by

                            @ShaneDeak

                            Its the same problem in my case. Single WAN workts perfect but activating a dual wan setup breaks it. Its possible to ping all IP destinations from OpenVPN Client pfsense (the one with dual wan), but it its not possible in case of clients which are part of the remote network ip range.

                            S 1 Reply Last reply Reply Quote 0
                            • S
                              ShaneDeak @Rossi
                              last edited by ShaneDeak

                              @Rossi said in in Site-to-Site OpenVPN can not access to the client LAN from Server:

                              Its the same problem in my case. Single WAN workts perfect but activating a dual wan setup breaks it. Its possible to ping all IP destinations from OpenVPN Client pfsense (the one with dual wan), but it its not possible in case of clients which are part of the remote network ip range.

                              It actually works for me now. After swapping the client and server side, I made the following entry on the client side (the side with dual WAN):

                              8e95fd35-25ad-4ac8-9a54-3607a5740b70-image.png

                              This is the network of the server side. But the instructions did not say that you have to enter this on the client side as well.

                              However, in the meantime, I also deleted the WAN gateway group and failover. So I don't know if the combination of both led to success.

                              GertjanG R 2 Replies Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @ShaneDeak
                                last edited by

                                @ShaneDeak

                                Just a reminder : this 10.10.10.1/24 network is also a default network created by pfBlockerng.
                                If you have pfBlocjerng installed, and have this :

                                fe658646-1fa2-450c-82c5-21c40290ba7b-image.png

                                then a 'nothing is working' situation is created.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                S 1 Reply Last reply Reply Quote 0
                                • S
                                  ShaneDeak @Gertjan
                                  last edited by

                                  @Gertjan

                                  I don't have this installed. But thanks for the info, will keep that in mind!

                                  1 Reply Last reply Reply Quote 0
                                  • R
                                    Rossi @ShaneDeak
                                    last edited by

                                    @ShaneDeak

                                    Makes no difference in my case. At the end i had to create a new LAN firewall rule at client site pfsense (the one with dual wan and failover).

                                    FailoverVPN.jpg

                                    10.0.33.0/24 is the remote local net.

                                    Now it works in both directions.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.