Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site-to-Site OpenVPN with Mikrotik : all ok from mikrotik, can't access mikrotik from pfsense

    Scheduled Pinned Locked Moved OpenVPN
    17 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      RoSs81_ct @viragomann
      last edited by RoSs81_ct

      @viragomann

      sorry but I can't understand what you mean by your question

      you mean: that I forced OVPN to use local and remote networks in a forced way? I can also remove them.

      thank you in advance

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @RoSs81_ct
        last edited by

        @RoSs81_ct
        VPN > OpenVPN > Client Specific Override
        I assume, you've configured an SSL OpenVPN? With a shared key site-to-site this is not needed.

        R 1 Reply Last reply Reply Quote 0
        • R
          RoSs81_ct @viragomann
          last edited by

          @viragomann

          you mean this?

          5aa124a5-2e3c-4692-a18b-348684461b0f-image.png

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @RoSs81_ct
            last edited by

            @RoSs81_ct
            Yes.

            R 1 Reply Last reply Reply Quote 0
            • R
              RoSs81_ct @viragomann
              last edited by

              @viragomann

              so i must disable this and in server list take only the peer2peer?

              regards

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @RoSs81_ct
                last edited by

                @RoSs81_ct
                In the server list you have to select the respective server for which you want to configure a CSO.

                You didn't reply to the VPN type. Maybe there is an easier solution.

                R 1 Reply Last reply Reply Quote 0
                • R
                  RoSs81_ct @viragomann
                  last edited by

                  @viragomann

                  unfortunately, nothing change :(

                  I'm considering the idea of ​​adding a mikrotik at the other site and adding the IPs of a new internal lan to the necessary clients.

                  works on a pfsense with a single IF was stressful. :)

                  thank you so much to ALL :)

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @RoSs81_ct
                    last edited by

                    @RoSs81_ct
                    Still not clear, which authentication type you've configured.
                    If it's an SSL AND you don't need to connect multiple clients to the server you can simply set the tunnel mask to /30. With this the CSO isn't needed.

                    Otherwise you have to ensure, that the CSO is applied properly and that the route are added. You can check this in the OpenVPN log, however, you have to enhance the verbosity level to 4 first and reconnect the client.

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      RoSs81_ct @viragomann
                      last edited by

                      @viragomann

                      You are right, i forgot it.
                      Tls/ssl with certificate and pre shared key

                      Connection between the 2 side was ok, from site b ( internal lan 192.168.88.0 ) i can reach all the host of site A pfsense included .

                      I have one client on site A must accept 3 o 4 connection at same time, rdp session for a software.

                      Tomorrow, if I have time, i can post some other screenshot of pfsense vpn config for the p2p.

                      Best regards and thank you so much.

                      Have a nice WE!

                      1 Reply Last reply Reply Quote 0
                      • R
                        RoSs81_ct
                        last edited by

                        Hi to all

                        so, little RECAP

                        SITE A:
                        Operator Router-> SWITCH -> ESXi with PFsense
                        Public IP -> Internal Lan 192.168.1.0/24 -> PFSENSE wan 192.168.1.240 with GTW 192.168.1.1 and virtual Interface ovpn peer2peer

                        SITE B:
                        Operator Router-> Mikrotik -> Internal LAN
                        Public IP -> wan 192.168.8.1 - LAN 192.168.88.1 -> Internal Lan 192.168.88.1/24

                        Peer to Peer tunnel 10.10.11.0/28 ( site A 10.10.11.1 / site B 10.10.11.2)
                        Connection OK between site
                        ping - other service from B to A -> OK
                        ping - other service from A to B -> KO

                        PFSENSE CONFIG:
                        29216526-883e-4dcf-be61-40e878d39ca4-image.png
                        7512a6dc-e92b-4e3e-b89e-7c34e5d06f27-image.png
                        6c54caac-b910-4b03-ad33-d67d0fddbc9f-image.png
                        e4dd2f8a-3d7c-423c-bb16-400bbe6aae84-image.png
                        0d34858e-90ff-4c9a-80c5-82a955a1864f-image.png
                        a38cbe88-9c96-4f29-9d8d-863c109cc347-image.png

                        With and Without CSO tested, but nothing change.

                        NAT
                        925d14c9-775d-4135-99b7-05c7910ba1a2-image.png

                        Rules
                        b0188b3d-c32f-4b06-96c4-c3e98b48c821-image.png

                        2e40e12b-3fc8-441c-8e79-1dcf651b606d-image.png

                        ROUTING
                        69cb7bb0-c088-4e88-a8c3-619c3f95dce1-image.png
                        bbda0e24-58d8-484c-b538-dc7b43ad78ae-image.png

                        SITE B: MIKROTIK

                        5d692e75-0ebe-4a90-a297-6944770da4e3-image.png
                        7bb9e00c-ba65-4c21-9bc2-48d1c9d75a53-image.png


                        Sorry for all the photos, but, it's to understand how the 2 devices were configured.
                        Any help is welcome, I don't know what else to check or other configurations to try.
                        Esxi has no rules on the internal switch.

                        **thank you so much for all the advice already writed, and have a nice new week.

                        ANDDD sorry for my English XD.**

                        REGARDS

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.