Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SG1100: routes seem correct, but not working

    Scheduled Pinned Locked Moved OpenVPN
    10 Posts 2 Posters 988 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      wmcneil
      last edited by

      I have two instances of a pfSense OpenVPN client running on a netgate SG1100. Each client is connected to a different pfSense OpenVPN Server. Both server instances are each running on a different netgate SG1100. The client (Z) can access local IP on one of the servers (X) correctly, but not the other server (Y), despite the routes (shown further below) appearing to be setup in the same manner. Here is the network configuration:

      Pfsense OpenVPN Server                         Tunnel              pfsense  OpenVPN Client
      10.55.83.0/24 OpenVPN Server X       VPN Tunnel 10.55.201.0/24     192.168.2.0/24 OpenVPN Client Z 
      pfSense router LAN IP: 10.55.83.10                                 pfSense router LAN IP: 192.168.2.1
      
      10.55.73.0/24 OpenVPN Server Y       VPN Tunnel 10.55.203.0/24     192.168.2.0/24 OpenVPN Client Z
      pfSense router LAN IP: 10.55.73.10                                 pfSense router LAN IP: 192.168.2.1
      

      Working as expected: On Client Z, I can ping the Server X router at 10.55.83.10, and access other local IPs on the server X side (EX: 10.55.83.192). On client Z, when I do a traceroute to a server X side local IP, I see that the first hop is 192.168.2.1, and the second hop is 10.55.201.1

      Not Working as expected: From Client Z, I can ping the Server Y router at 10.55.73.10, but can not successfully ping or access other local IPs on the Server Y side. The applicable routes are shown below. Everything looks correct, and I’m not seeing what could be different that is causing access to local X IP to work, but not access to local Y IP (other than the Y pfSense router local IP). Any help is much appreciated.

      Applicable OpenVPN Client Z routes :

      10.55.73.0/24	10.55.203.1	UGS	15	1500	ovpnc3	
      10.55.203.0/24  link#15	        U	13	1500	ovpnc3	
      10.55.203.250	link#7		UHS	14	16384	lo0	
      
      10.55.83.0/24	10.55.201.1	UGS	12	1500	ovpnc1		
      10.55.201.0/24	link#14		U	10	1500	ovpnc1	
      10.55.201.250	link#7		UHS	11	16384	lo0
      
      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @wmcneil
        last edited by

        @wmcneil said in SG1100: routes seem correct, but not working:

        From Client Z, I can ping the Server Y router at 10.55.73.10, but can not successfully ping or access other local IPs on the Server Y side.

        Even from the client router itself or from devices behind it?

        Is Z the default gateway in the remote network?

        W 1 Reply Last reply Reply Quote 0
        • W
          wmcneil @viragomann
          last edited by wmcneil

          @viragomann said in SG1100: routes seem correct, but not working:

          @wmcneil said in SG1100: routes seem correct, but not working:

          From Client Z, I can ping the Server Y router at 10.55.73.10, but can not successfully ping or access other local IPs on the Server Y side.

          Even from the client router itself or from devices behind it?

          A traceroute from either the Client Z local pfSense router(192.168.2.1), or another 192.168.2.xxx client, to Server Y client 10.55.73.191 reports the first two hops as follows, then times out on subsequent hops:
          1 10.55.203.1 (10.55.203.1) 35.639 ms 33.945 ms 32.847 ms
          2 10.55.73.191 (10.55.73.190) 28.918 ms 31.699 ms 36.744 ms

          Despite this, I can not reach 10.55.73.191 with Remote Desktop Connection from a 192.168.2.xxx client. (The same scenario from the same 192.168.2.xxx client to server X client 10.55.83.192 does work for remote desktop connection)

          Is Z the default gateway in the remote network?

          yes:
          Default Gateway . . . . . . . . . : fe80::f2ad:4eff:fe1e:87c8%10
          192.168.2.1

          1 Reply Last reply Reply Quote 0
          • W
            wmcneil
            last edited by

            I realized the server Y client I was using in the scenario above is not actually capable of responding to a ping, so I switched to a different Y client(10.55.73.193) which is capable. I am still not reaching the Y client from the Z windows client, but the results of traceroute indicate I may be reaching it from the Z pfsense router():

            traceroute from Z pfSense router(192.168.2.1) to Y client 10.55.73.193:

            1  10.55.203.1 (10.55.203.1)  29.594 ms  31.028 ms  32.122 ms
            2  10.55.73.193 (10.55.73.193)  63.680 ms  33.712 ms  34.563 ms
            3  10.55.73.193 (10.55.73.193)  34.344 ms  28.973 ms  34.907 ms
            

            tracert from Z windows client (192.168.2.135) to Y client 10.55.73.193:

            1     1 ms    <1 ms    <1 ms  cabin_pfSense.localdomain [192.168.2.1]
            2    33 ms    31 ms    39 ms  10.55.203.1
            3     *        *        *     Request timed out.
            

            The traceroute from the Z pfSense router is not timing out (max number of hops is set to 5, and it is reaching the target on hop2 (and hop3), so it appears to be reaching the target. I don't know why the traceroute shows the Y client being reached in both hops 2 and 3 (why is it not stopping after hop2)?

            Given the routes listed further above, I don't understand why the tracert from the Z windows client is not reaching the target. The first two hops are as expected, and consistent with the routes shown in the posts further above.

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @wmcneil
              last edited by

              @wmcneil
              Does the remote device allow the access?

              Did you configure a CSO for the client?

              W 1 Reply Last reply Reply Quote 0
              • W
                wmcneil @viragomann
                last edited by

                @viragomann said in SG1100: routes seem correct, but not working:

                @wmcneil
                Does the remote device allow the access?

                Yes. If I connect the Z client (192.168.2.135) via a different OpenVPN client (use Windows OpenVPN client connected via cell phone network instead of via the Z pfsense OpenVPN client), everything works. Note that in this case I am still using the Y pfsense OpenVPN Server.

                Did you configure a CSO for the client?

                I do have a CSO on the Y OpenVPN server side that allows Y clients to access the Z OpenVPN client local IP network, and this access is working. I'm not understanding why this is relevant? (My problem is the opposite direction: OpenVPN client side (Z) access to OpenVPN server side (Y) local IP, and CSO is not used for that direction, unless I do not understand something?)

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @wmcneil
                  last edited by

                  @wmcneil said in SG1100: routes seem correct, but not working:

                  I do have a CSO on the Y OpenVPN server side that allows Y clients to access the Z OpenVPN client local IP network, and this access is working.

                  You didn't mention that before.

                  I'm not understanding why this is relevant? (My problem is the opposite direction: OpenVPN client side (Z) access to OpenVPN server side (Y) local IP, and CSO is not used for that direction, unless I do not understand something?)

                  Yes, for accessing the remote site from devices behind the Y router, the CSO is necessary though. And this is, where you have issues according to your posts.
                  The CSO not needed for access from the client itself, which obviously works.

                  But if you can access devices behind the Y router from Z local network, the CSO should be applied properly.

                  Then the only thing I get into mind is, that there is something wrong with the routes at Y, but need to see the whole routing table.

                  W 2 Replies Last reply Reply Quote 0
                  • W
                    wmcneil @viragomann
                    last edited by

                    @viragomann said in SG1100: routes seem correct, but not working:

                    @wmcneil said in SG1100: routes seem correct, but not working:

                    I do have a CSO on the Y OpenVPN server side that allows Y clients to access the Z OpenVPN client local IP network, and this access is working.

                    You didn't mention that before.

                    I'm not understanding why this is relevant? (My problem is the opposite direction: OpenVPN client side (Z) access to OpenVPN server side (Y) local IP, and CSO is not used for that direction, unless I do not understand something?)

                    Yes, for accessing the remote site from devices behind the Y router, the CSO is necessary though. And this is, where you have issues according to your posts.

                    I'm not trying to be argumentative, and I appreciate your help, but you seem to have the directions reversed from what I have described. I believe I have been consistent in all that I have written previoulsy, but I'll try again: Y is where the pfsense OpenVPN server and router are located. Z is where the pfSense OpenVPN client and router are located.

                    I agree with your statement that devices behind Y router require a CSO to access local IP of devices behind the Z router. You are not correct in stating this is where I have issues. Rather, as previously communicated, this direction is working correctly.

                    As previously stated, my issue is devices behind Z router not being able to access devices behind Y router.

                    The CSO not needed for access from the client itself, which obviously works.

                    I agree with your statement that CSO is not needed for access from the client side, which is Z. However, your statement that this obviously works is not correct. As previously stated, my issue is devices behind Z (OpenVPN client) router not being able to access devices behind Y (OpenVPN server) router.

                    But if you can access devices behind the Y router from Z local network, the CSO should be applied properly.

                    No, I cannot access devices behind the Y router from Z local network. This is the problem. And CSO does not apply to access of devices behind the Y router from Z local network, it applies in the opposite scenario, for access of devices behind the Z router from Y local network.

                    Then the only thing I get into mind is, that there is something wrong with the routes at Y, but need to see the whole routing table.

                    Here are all the routes at Y, which is the OpenVPN server side:

                    default	        HIDE_IP	        UGS	7	1500	mvneta0.4090
                    10.55.73.0/24	link#10	        U	1	1500	mvneta0.4091	
                    10.55.73.10	link#7	        UHS	3	16384	lo0	
                    10.55.83.0/24	10.55.201.1	UGS	13	1500	ovpnc1	
                    10.55.201.0/24	link#14	        U	11	1500	ovpnc1	
                    10.55.201.251	link#7	        UHS	12	16384	lo0	
                    10.55.203.0/24	link#13	        U	8	1500	ovpns2	
                    10.55.203.1	link#7	        UHS	9	16384	lo0	
                    HIDE_IP  	link#12	        U	4	1500	mvneta0.4090	
                    HIDE_IP	        link#12	        UHS	6	1500	mvneta0.4090	
                    HIDE_IP	        link#7	        UHS	5	16384	lo0	
                    127.0.0.1	link#7	        UH	2	16384	lo0	
                    192.168.2.0/24	10.55.203.2	UGS	10	1500	ovpns2	
                    209.18.47.61	link#12	        UHS	6	1500	mvneta0.4090	
                    209.18.47.63	link#12	        UHS	6	1500	mvneta0.4090
                    

                    Here are all the routes at Z, which is the OpenVPN client side:

                    default	        HIDE_IP	        UGS	9	1500	mvneta0.4090	
                    8.8.4.4	        link#12	        UHS	5	1500	mvneta0.4090	
                    8.8.8.8	        link#12	        UHS	5	1500	mvneta0.4090	
                    10.55.73.0/24	10.55.203.1	UGS	15	1500	ovpnc3	
                    10.55.83.0/24	10.55.201.1	UGS	12	1500	ovpnc1	
                    10.55.201.0/24	link#14	        U	10	1500	ovpnc1	
                    10.55.201.250	link#7	        UHS	11	16384	lo0	
                    10.55.202.0/24	link#13	        U	6	1500	ovpns2	
                    10.55.202.1	link#7	        UHS	8	16384	lo0	
                    10.55.203.0/24	link#15	        U	13	1500	ovpnc3	
                    10.55.203.250	link#7	        UHS	14	16384	lo0	
                    HIDE_IP	        link#12	        U	1	1500	mvneta0.4090	
                    HIDE_IP 	link#7	        UHS	4	16384	lo0	
                    127.0.0.1	link#7	        UH	2	16384	lo0	
                    192.168.2.0/24	link#10	        U	3	1500	mvneta0.4091	
                    192.168.2.1	link#7	        UHS	7	16384	lo0
                    
                    1 Reply Last reply Reply Quote 0
                    • W
                      wmcneil @viragomann
                      last edited by

                      @viragomann I am sorry, I have been confusing CSO with "server route". So my prior statements about CSO not mattering for OpenVPN client to server routing were not correct. (I was incorrectly thinking of server route statements, which do in fact apply only in the server to client direction.)

                      That said, I do have a CSO in place on server Y, and it specifies tunnel network 10.55.203.250/24 and remote network 192.168.2.0/24. So that should be exactly correct.

                      Note that I also have an additional server X (as described previously), and the CSO in place on server X calls out tunnel network 10.55.201.250/24 and remote network 192.168.2.0/24. As stated previously, local accesses to devices behind router X from behind router Z are working correctly.

                      Because Z to X is working correctly (and Z to Y is not), I have been digging through and comparing every pfSense setting between router/server X and router/server Y to try and find a difference that would provide a hint as to the problem with Y, and I have not been able to find anything.

                      1 Reply Last reply Reply Quote 0
                      • W
                        wmcneil
                        last edited by

                        I've crawled through the routing tables (previously posted), and I find nothing incorrect. The tracert result from a client behind the Z router/OpenVPN client to a client behind the Y router/OpenVPN server shows the correct first two hops, and I can see no reason why it should not find the final destination (10.55.73.193):

                        @wmcneil said in SG1100: routes seem correct, but not working:

                        tracert from Z windows client (192.168.2.135) to Y client 10.55.73.193:

                        > 
                        > 1     1 ms    <1 ms    <1 ms  cabin_pfSense.localdomain [192.168.2.1]
                        > 2    33 ms    31 ms    39 ms  10.55.203.1
                        > 3     *        *        *     Request timed out.
                        
                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.