Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Connected client's wan ip is still getting assigned Wan ip.

    Scheduled Pinned Locked Moved OpenVPN
    21 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      ozgurerdogan @viragomann
      last edited by

      @viragomann said in Connected client's wan ip is still getting assigned Wan ip.:

      @ozgurerdogan
      No, this cannot be done. In the server settings you can either push the routes for certain subnets or for the whole upstream traffic (redirect gateway).
      I am new to this. But can not figure out. What I do not understand is why this is only happening only 1-2 clients but not others. I but think this about routing..

      O 1 Reply Last reply Reply Quote 0
      • O
        ozgurerdogan @ozgurerdogan
        last edited by

        @ozgurerdogan
        I tried setting "push "redirect-gateway def1"" on a unchecked "Force all client-generated IPv4 traffic through the tunnel." server that caused client to use pfsense as default gateway.
        But that client does not have this option. So maybe I can force to use opposite of push "redirect-gateway def1" if there is any :)

        V 1 Reply Last reply Reply Quote 0
        • V
          viragomann @ozgurerdogan
          last edited by

          @ozgurerdogan
          This option is only in the server settings.

          What about the client log??

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @ozgurerdogan
            last edited by

            @ozgurerdogan said in Connected client's wan ip is still getting assigned Wan ip.:

            Other clients' ip remain same as it was before connecting to vpn.

            You sure its just not an old state on the client?

            If I go to say check my IP, and then connect to vpn, and then check my IP again - it can use the old connection. And still go out his normal wan vs going down the vpn.

            Have him look at his routes

            before, and then after connection..

            Example here is mine

            default.jpg

            See how a default route got added, the 0.0.0.0 route.. and can see in the connection log it was told to use gateway

            2023-10-08 14:16:39 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 10.255.254.1,route 10.255.254.1,topology net30,ping 10,ping-restart 120,ifconfig 10.255.254.30 10.255.254.29,peer-id 2,cipher AES-256-GCM'
            2023-10-08 14:16:39 Flag 'def1' added to --redirect-gateway (iservice is in use)
            

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            O 1 Reply Last reply Reply Quote 0
            • O
              ozgurerdogan @johnpoz
              last edited by

              @johnpoz
              Yes I am sure ip changes to Pfsense's WAN ip after connecting for that client.
              Could this be issue because his OpenVPN client is old version ?
              How about If I set pull-filter ignore "redirect-gateway"

              I will post logs once I got them.

              V johnpozJ 2 Replies Last reply Reply Quote 0
              • V
                viragomann @ozgurerdogan
                last edited by

                @ozgurerdogan
                All you can do at the client is adding a line to the config to avoid adding the routes pushed by the server:

                route-nopull
                

                and add the routes manually. E.g.:

                route 10.10.0.0 255.255.255.0
                

                to route 10.10.0.0/24 to the server.

                Not sure if this helps.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @ozgurerdogan
                  last edited by

                  @ozgurerdogan what are you trying to do - you don't want this client to route through pfsense to get to the internet, and just want them to get to your network behind pfsense via the vpn. Or you do want them to route through pfsense to get to that internet?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  O 1 Reply Last reply Reply Quote 0
                  • O
                    ozgurerdogan @johnpoz
                    last edited by

                    @johnpoz
                    I want them connect to rdp behind Pfsense. And retain their wan ip as before connecting to Pfsense.
                    Don't want client to route through pfsense to get to the internet.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @ozgurerdogan
                      last edited by johnpoz

                      @ozgurerdogan well then uncheck this..

                      redirect.jpg

                      And make sure your network you want them to get to is routed as your local network(s).. See my highlighted.

                      Your only problem could be when they have the same network.. If their local network is say 192.168.1.0/24 and your local network is the same 192.168.1.0/24 then they going to have a problem..

                      If you had that checked before, you will need to give them a new ovpn file to use, or have them edit their local copy to not redirect the gateway.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      O 1 Reply Last reply Reply Quote 0
                      • O
                        ozgurerdogan @johnpoz
                        last edited by

                        I am sorry guys. There was a misunderstaning. :)
                        Client's wan ip remain same after vpn. And he connects to RDP which has two nics. One for VPN internal network, one with wan ip for users not using VPN.

                        So when client connects to rdp via vpn, his wan ip becames pfsense wan ip. So I need to make other nic as his default route...

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @ozgurerdogan
                          last edited by

                          @ozgurerdogan Huh??

                          So this remote vpn client rdp to some box on your network 192.168.1.100.. Why would this 1.100 box have 2 nics in the first place??

                          But sure if if this 1.100 box has 2 nics.. And some remote IP talks to it.. It would use its default route to try and get back.. So take it this 1.100 rdp box isn't using pfsense as its default gateway..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          O 1 Reply Last reply Reply Quote 0
                          • O
                            ozgurerdogan @johnpoz
                            last edited by

                            @johnpoz

                            Has two nics. One nic with wan ip (no-vpn) has ip restrictions at firewall for certain clients only. And those clients can not be using vpn. And other nic for vpn clients.

                            So whether it is vpn or non-vpn client, rdp box must be using one default route which must be one nic only. Should I set this at nic settings or with routes..?

                            johnpozJ 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @ozgurerdogan
                              last edited by johnpoz

                              @ozgurerdogan If you have some box with 2 nics.. You need to make sure it the correct route to get to whatever your vpn tunnel network is.. Or it would just use its default route to try and answer some IP it does not have a route too.

                              So this other wan connection being used for non vpn rdp into this box, is not pfsense I take it.. Why would this other connection not come into pfsense?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.