Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN client LAN access from server LAN

    Scheduled Pinned Locked Moved OpenVPN
    18 Posts 4 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      blackslash @marvosa
      last edited by

      @marvosa @viragomann

      I have since had to switch to TAP due to domain broadcast requirement.

      The config was updated to TAP and allow clients on bridge to obtain DHCP and bridge interface was set to LAN.

      Clients connecting via the Teltonika which is configured as the OpenVPN client receives an IP via DHCP. From pfSense I can ping to any of these clients but clients cannot still communicate with one another.

      Allow communication between clients connected to this server is ticked.

      B 1 Reply Last reply Reply Quote 0
      • B
        blackslash @blackslash
        last edited by

        Also to clarify, clients on the server LAN can communicate with one another and also client on Teltonika side once they receive an IP via DHCP can also communicate with one another. It's just that client communication over the VPN which is not working.

        1 Reply Last reply Reply Quote 0
        • B
          blackslash
          last edited by

          Any ideas?

          1 Reply Last reply Reply Quote 0
          • B
            blackslash @marvosa
            last edited by

            @marvosa
            For the sake of getting this to work, I switched back to TUN.

            I will leave Redirect IPv4 Gateway ticked as I want all traffic from the client LAN to go via VPN.

            I have filled in the Remote Network details as well. When I modify the OpenVPN firewall rule as you suggested, the client LAN devices can no longer ping the Server LAN devices or even vice versa.
            Leaving the rule to any allows the client LAN devices to ping to server LAN but server LAN to Client LAN does not work. Any ideas?

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @blackslash
              last edited by

              @blackslash said in OpenVPN client LAN access from server LAN:

              allows the client LAN devices to ping to server LAN but server LAN to Client LAN does not work. Any ideas?

              Maybe, a question first.

              This 'LAN server' and these "LAN clients" are all on the same LAN ?
              Like the server uses 192.168.1.10 and the clients 192.168.1.15 and 192168.1.21 etc ?

              If so, be advised : traffic from this server to a LAN client, or the LAN client to the server is never seen by pfSense ... traffic never enters the LAN interface ... so the pfSense LAN firewall rules not see this traffic. In theory, you could power down pfSense and nothing changes.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              B 1 Reply Last reply Reply Quote 0
              • B
                blackslash @Gertjan
                last edited by

                @Gertjan

                Thanks for getting back to me to. I have since updated the subnets since the original post was made.
                No they are not, the LAN behind pfSense is on the 192.168.110.0/24 subnet. LAN behind the client which is a Teltonika RUT device has a bunch of sensors, which is on 192.168.15.0/24.

                For testing purposes, I have connected a laptop onto the LAN of the Teltonika RUT devices and spun up a windows VM on the pfsense LAN.

                From the laptop on the client end, I can ping pfSense and devices on the pfSense LAN (192.168.15.0/24 -> 192.168.110.0/24)

                But from the VM or any device on the pfSense LAN, I cannot ping the devices which are on the client LAN (Teltonika LAN)

                M 1 Reply Last reply Reply Quote 0
                • M
                  marvosa @blackslash
                  last edited by marvosa

                  @blackslash

                  When I modify the OpenVPN firewall rule as you suggested, the client LAN devices can no longer ping the Server LAN devices or even vice versa. Leaving the rule to any allows the client LAN devices to ping to server LAN but server LAN to Client LAN does not work. Any ideas?

                  If you moved to TUN, and presumably switched subnets on the client-side, the rules on the OpenVPN tab need to be adjusted accordingly. Also, need to determine if the client-side is NAT'ing traffic over the tunnel which would change your rule(s). Although, it's moot if you went to an any/any.

                  If you've switched to TUN, changed subnets, and added an any/any on the OpenVPN tab, we're probably looking at a firewall issue on the client-side.

                  Can you post:

                  • The routing table from both ends

                  • The firewall rule(s) from the OpenVPN tab on the server and wherever they live on the Teltonika side.

                  • The OpenVPN server config (/var/etc/openvpn/server1/config.ovpn)

                  I'm not familiar with Teltonika devices, but a few Google searches brought me here:

                  https://wiki.teltonika-networks.com/view/OpenVPN_Access_Control

                  and I'll bet this section needs to be adjusted on the Teltonika if it looks similar on your device:

                  386c7493-1b15-4e7a-b929-326b865bfd6b-image.png

                  1 Reply Last reply Reply Quote 0
                  • B
                    blackslash
                    last edited by

                    @marvosa Thank you kindly for responding.

                    I did stumble upon the Teltonika Wiki and had that change implemented but did not help.

                    Please see sanitized server config below

                    dev ovpns2
                    verb 5
                    dev-type tap
                    dev-node /dev/tap2
                    writepid /var/run/openvpn_server2.pid
                    #user nobody
                    #group nobody
                    script-security 3
                    daemon
                    keepalive 10 60
                    ping-timer-rem
                    persist-tun
                    persist-key
                    proto udp4
                    auth SHA256
                    up /usr/local/sbin/ovpn-linkup
                    down /usr/local/sbin/ovpn-linkdown
                    client-connect /usr/local/sbin/openvpn.attributes.sh
                    client-disconnect /usr/local/sbin/openvpn.attributes.sh
                    local xxx.xxx.xxx.xxx
                    tls-server
                    mode server
                    tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'Name' 1"
                    lport 1194
                    management /var/etc/openvpn/server2/sock unix
                    push "redirect-gateway def1"
                    client-to-client
                    capath /var/etc/openvpn/server2/ca
                    cert /var/etc/openvpn/server2/cert 
                    key /var/etc/openvpn/server2/key 
                    dh /etc/dh-parameters.2048
                    tls-auth /var/etc/openvpn/server2/tls-auth 0
                    data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                    data-ciphers-fallback AES-128-GCM
                    allow-compression no
                    

                    Routable on pfsense
                    Screenshot 2025-01-06 102658.jpg

                    Routing table on Teltonika
                    Screenshot 2025-01-06 103617.jpg

                    Traffic rules on Teltonika
                    Screenshot 2025-01-06 104732.jpg
                    Screenshot 2025-01-06 104756.jpg
                    Screenshot 2025-01-06 104816.jpg

                    Zone rule on Teltonika
                    Screenshot 2025-01-06 104852.jpg

                    Firewall rule on pfSense
                    Screenshot 2025-01-06 105235.jpg

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      marvosa @blackslash
                      last edited by marvosa

                      @blackslash The config posted shows "dev-type tap". Did you move back to TAP, or is that an old config?

                      I also don't see a route statement to your client-side LAN in your config. Which would be why there's no route to 192.168.15.0/24 in PFsense's routing table. PFsense needs to know that the client-side LAN exists over the tunnel otherwise traffic sourced from the server-side won't get there.

                      The way that Teltonika interprets those zones is somewhat confusing, but basically, you need to allow the server-side LAN subnet access to the client-side LAN over the tunnel... and I'm not sure the current config is getting you there. It appears adjustments may need to be made to align with our config. Does the Teltonika have a syslog for the firewall? Once the server-side traffic is routed over there, you'll likely see blocks in the logs.

                      B 1 Reply Last reply Reply Quote 0
                      • B
                        blackslash @marvosa
                        last edited by

                        @marvosa

                        I've been playing around with different configs to try and get this to work. At the moment on a TAP setup.

                        192.168.110.0/24 is the pfSense LAN which has been bridged to the Teltonika.

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          marvosa @blackslash
                          last edited by

                          @blackslash If you moved back to TAP, TAP extends layer 2, so you'd need to move the client-side over to 192.168.110.0/24, move the cliend-side to TAP, then bridge the tunnel interface to the LAN on both ends, which you may or may not have done already. However, the routing table on the client-side shows the LAN bridged to 192.168.15.0/24, so that'll need to be looked at.

                          Once the above is sorted out, I still think the client-side firewall needs some tweaking. You may want to add an any/any on the client-side as well until basic IP communication is established. Also, I don't believe you want to be NAT'ing over the the tunnel with your config.

                          You'll also want to define the DHCP scope on either end so there's no overlap, unless you have another solution in place to manage IP's.

                          1 Reply Last reply Reply Quote 0
                          • B
                            blackslash
                            last edited by blackslash

                            For anyone who stumbles upon this in the future, I know my config was correct, but I switched between OpenVPN (TAP & TUN), Wireguard and IPSec and they all had the same output. Communication issue between clients.

                            I then configured this on a test environment, and it all worked as it should which meant there was nothing wrong with the config.

                            I then pushed the people at the data center to investigate despite them saying there is nothing wrong on their end, and it ended up being a filter applied on the Public IP VLAN at the data center. Once they removed it, it just started to work as it should.

                            GertjanG 1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan @blackslash
                              last edited by

                              @blackslash

                              They were fire-walling port 1194 UDP traffic ?
                              They are anti OpenVPN ?

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.