Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No traffic over CloudConnexa Connector

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 2 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @Bambos
      last edited by viragomann

      @Bambos
      So you say, everything is set correctly, but it doesn't work. And you don't provide real configuration details. So how should anybody here help you?

      Then go to your pfSense and sniff the traffic on the incoming VPN interface and on that towards the destination device, while you try to access it.
      Then come back with results.

      B 1 Reply Last reply Reply Quote 0
      • B
        Bambos @viragomann
        last edited by

        @viragomann I'm very happy to share all the details, but this cloudconnexa platform is self managed with default tunnels etc... you just set a "connector" for the site to site VPN tunnel, and routing to destination network through that "connector".

        The connector is site to site on Cloudconnexa for pfSense (between many more providers). For this there is option to create a Route to destination network for remote access clients, and "IP Service" for the site to site connection. i have followed this: https://openvpn.net/cloud-docs/owner/routers/router-user-guides/using-cloudconnexa-profile-to-configure-pfsense.html
        which is a single configuration for the site to site tunnel. (nothing to set really).

        Like below:

        8a1e2e7e-1389-4475-9e58-cf9d65bc214d-image.png

        76a844c9-fe27-45ce-b5a3-1d2388fe18c3-image.png

        c72e944b-7f40-41be-ac57-e631ea71c0e2-image.png

        On the pfsense site:
        4c113379-735c-4f04-84ea-06685f9a5f2b-image.png

        955d51e6-331e-4aee-ac44-7da1a29c0042-image.png

        and an allow all rule on the VPN interface.

        On the Windows Client:

        d313efdf-11a6-4ae6-9e5d-c7197ee13ae5-image.png

        95383653-e51b-4beb-a736-5c4c3eda13a1-image.png

        V 1 Reply Last reply Reply Quote 0
        • V
          viragomann @Bambos
          last edited by

          @Bambos
          So obviously Windows is not respecting the shown route.
          Maybe there is another route for this destination with higher priority?

          B 1 Reply Last reply Reply Quote 0
          • B
            Bambos @viragomann
            last edited by Bambos

            @viragomann Thanks for the hint. the routing is clean on the windows client.

            Since my pfSense to pfsense (site to site) and then remote access to pfsense tunnels are working, after your comment i suspected that something is wrong with CloudConnexa and open a support ticket there. I'm coming back with news, after they ask all the basic things. :) 📅

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @Bambos
              last edited by

              @Bambos
              As I understood this setup, there is
              LAN <-> pfSense <-> VPN to CloudConnexa <-> VPN to Windows client

              And the above screenshots are from the Winodws client. The first one obviously shows a static route, but the tracert in the second does not follow it.

              B 1 Reply Last reply Reply Quote 0
              • B
                Bambos @viragomann
                last edited by

                @viragomann yes, exactly this is the setup.
                I had a foreign partner asking for access on a specific device inside the LAN. 192.168.47.22. I suggest to have a small pfsense, hardware or VM on their side to serve as open vpn server, so i can establish a tunnel to it and gain access to the device by remote access VPN Server.
                They search for a cloud alternative instead, and suggested CloudConnexa, which is openvpn.com service. to my understanding, pre-defined instances of Open VPN Servers to accept multiple connections and also provide remote Access VPN to users.

                Let's hope the folks handling the CloudConnexa ticket will support. I'm coming back for any updates.

                B 1 Reply Last reply Reply Quote 0
                • B
                  Bambos @Bambos
                  last edited by

                  @viragomann i got some strange updates with this VPN Setup.

                  It NEEDS the dedicated VPN interface to be assigned, but also needs the bogon networks unblocked. (private networks blocked or unblocked has nothing to do) i don't know why. Is working like below:

                  c00447a1-2c60-4567-a5a8-656978963a42-image.png

                  But also another strange thing, is that the actuall traffic of the VPN Tunnel is working through the OpenVPN interface, (which is for remote access) if i'm not mistaken.

                  bdcbe90f-c5db-45fe-a23a-9a763ce88a78-image.png

                  376ff14c-31b6-4869-9192-7203bd657062-image.png

                  For Site to Site tunnel, i was expecting to have all the traffic to the dedicated VPN Tunnel interface.
                  Can i have your comments on that ?? Is it incompatibility between pfsense versions ? or cloudconnexa issue ??

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @Bambos
                    last edited by

                    @Bambos said in No traffic over CloudConnexa Connector:

                    It NEEDS the dedicated VPN interface to be assigned, but also needs the bogon networks unblocked. (private networks blocked or unblocked has nothing to do) i don't know why.

                    OMG, they indeed use bogon for the OpenVPN tunnel and obviously they do masquerading (S-NAT) on traffic to your site.
                    Without masquerading, you would have to allow private networks.
                    This means, traffic from the remote to your site is coming in from the source of the VPN servers virtual IP.

                    But also another strange thing, is that the actuall traffic of the VPN Tunnel is working through the OpenVPN interface, (which is for remote access) if i'm not mistaken.
                    For Site to Site tunnel, i was expecting to have all the traffic to the dedicated VPN Tunnel interface.

                    The "OpenVPN" is an interface group in fact. It is automatically created by pfSense, when firing up the first OpenVPN instance, either server or client. So it also includes both types.

                    You have to know, that rules on interface groups are probed first, so they have priority over ones on member interfaces. So if a rule on the group applies, block, reject or pass, rules on the member interface are ignored.

                    B 1 Reply Last reply Reply Quote 0
                    • B
                      Bambos @viragomann
                      last edited by

                      @viragomann Thanks for the info.

                      I have other site to site tunnels between pfsense boxes, and there is no rule on OpenVPN interface, and all the rules apply to the dedicated assigned interface.

                      What is the difference with this setup ??

                      298a1d01-5e46-4a06-8d7f-800f5ff4f09e-image.png

                      cb993be1-a9ad-4cfb-8e5a-5a01e3d15bf7-image.png

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @Bambos
                        last edited by

                        @Bambos said in No traffic over CloudConnexa Connector:

                        I have other site to site tunnels between pfsense boxes, and there is no rule on OpenVPN interface, and all the rules apply to the dedicated assigned interface.

                        What is the difference with this setup ??

                        As I mentioned, OpenVPN is an interface group. Rules on this tab are applied to all OpenVPN instances on the machine.

                        Refer to the docs:
                        Interface Groups
                        Rule Processing Order

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.