Can connect to OVPN Server and that's about it
-
@pfsblah said in Can connect to OVPN Server and that's about it:
utun8: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
inet 192.168.200.2 --> 192.168.200.2 netmask 0xffffff00This indicates wrong tunnel settings to me.
How did you configure the OpenVPN server?
Did you add a client specific override as well? -
@pfsblah said in Can connect to OVPN Server and that's about it:
Whatever I do, the VPN Server Gateway stays Offline with 100% packet loss. I guess I should have started with that
Why would you be setting a gateway on a RW setup?
https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-ra.html
I have remote access into all of my networks and even internet if set client to use the vpn for all traffic - I don't have a gateway setup on this.. Only need a gateway for vpns you use outbound from pfsense.
To be honest the wizard runs through everything you need to setup a remote access, ie road warrior setup. Trying to follow some guide from some old guide for a version of pfsense 2.5 that has been EOL for years doesn't make much sense to me, when you can just click through a wizard.
-
@viragomann
The VPN Settings are as follow:IPv4 Tunnel Network : 192.168.200.0/24 Redirect IPv4 Gateway : enabled DNS Server enable : enabled DNS Server 1 : 192.168.200.1 Block Outside DNS : enabled Force DNS cache update : enabled NTP Server enable : enabled NTP Server 1 : 192.168.200.1
I use the client export Utility module. The final result looks smething like the redacted following
dev tun persist-tun persist-key data-ciphers AES-256-GCM:AES-256-CBC data-ciphers-fallback AES-256-CBC auth SHA512 tls-client client resolv-retry infinite remote my.home.com 1198 udp4 setenv opt block-outside-dns lport 0 verify-x509-name "internal-ca" name auth-user-pass remote-cert-tls server explicit-exit-notify <ca> -----BEGIN CERTIFICATE----- <redacted> -----END CERTIFICATE----- </ca> <cert> -----BEGIN CERTIFICATE----- <redacted> -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- <redacted> -----END PRIVATE KEY----- </key> key-direction 1 <tls-auth> #^M # 2048 bit OpenVPN static key^M #^M -----BEGIN OpenVPN Static key V1-----^M <redacted> -----END OpenVPN Static key V1----- </tls-auth>
-
Hi @johnpoz,
Thanks for the link to the doc. I had followed thenguvu
doc for my multi vpn client setup and just followed with the next to setup the VPN Server as the first setup worked well and made sense.I will read the doc and try the wizard. Maybe I should have just done that! ;)
Thanks for your time.
-
Hi @johnpoz ,
I took your advice, scratched my setup (all of it I hope) and ran the wizard. I am certainly better off but not there yet. I see a few oddities which I hope are not due to legacy settings. If you have a sec, could you give me your opinion?-
unable to reach the Internal DNS. I specify the firewall as being the DNS on that interface but it doesn't respond to queries.
-
I am however able to reach 1.1.1.1 and query the DNS
-
The internet remains unreachable, even then changing my nameserver to
1.1.1.1
. I am able to reach devices in my LAN as long as I connect to them using the IP. -
I also noticed the following when doing a netstat
1.1.1.1 link#27 UHW3Ig utun8 9 4.2.2.1 link#27 UHW3Ig utun8 3 4.2.2.2 link#27 UHWIig utun8
I have no clue why they are listed there. A couple of them are used to check the Gateway health of my VPN Clients and one might have been used in an earlier setup. They are not the default DNS entries of my router.
- Last but not least, I am a little ashed to say that I can't see any traffic on any interface so I need a manual reference to understand that part. Whilst running tests when connected to the RW VPN, I did some simple calls to specific ports and IPs to then try and find them in the firewall logs
$ nc -vz 192.168.1.100 6789 $ nc -vz google.com 6789
but when I went to the firewall logs, I found no trace of the ip address of the connected user, no blocked traffic on the above ports, nothing. I would have expected traffic on the
OpenVPN
interface.A bit baffled by all these behaviours. At worst, I could revert back to a backup prior to any RW VPN attempt and start the wizard again...
Thanks for your help.
-
-
@pfsblah as to see traffic in your firewall logs - what are you logging, the wizard setups a any any for vpn - nothing would be logged.
If you can query the dns 1.1.1.1 from your remote vpn user, through the tunnel then internet through the tunnel should work.
What IP did you set your remote vpn users to use for dns, a lan side pfsense IP, the pfsense vpn IP - is unbound on pfsense listening on this IP, are the acls correct for your vpn tunnel IPs?
As to what those 1.1.1.1 and 4.2.2.2 are - that is not something pfsense would of ever setup on its own that is for sure.
-
@johnpoz
Thanks for all your help. I am clearly moving quicker than I can learn. I will revert to a previous backup where no VPN Server was setup and start from there. There are too many strange behaviours.Thanks for your time!
-
@pfsblah said in Can connect to OVPN Server and that's about it:
unable to reach the Internal DNS. I specify the firewall as being the DNS on that interface but it doesn't respond to queries.
Could be this : ask yourself : is unbound, the pfSense resolver listen to the the OpenVPN server interface ? It should do so, so it can handle DNS traffic from VPN connected clients.
The default resolver setting will do just fine :
Also check that you are not using ACLs, and if you do, you've included the OpenVPN server interface.
Normally
, when you have a default pfSense and you execute the wizard, or, way more fun, use the official video guide (there are several old ones, but still very valid - there are 2 (3 ?) OpenVPN server videos) and a more recent one here you should have a working access.
Remember : first, make it work. Do exactly as indicated. As soon as it work, you can add/make changes. From now on, as soon as it fails, you know what went wrong.And the official doc : https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-ra.html
-
Many thanks @Gertjan, I will be doing just that. I will revert to changes I made prior to setting up the RW VPN and follow the wizard. It means I'll have to reset a lot of things but I will check every thing works at each step.
Thanks for taking the time.
-
@johnpoz, @Gertjan, @viragomann
I can't give thumbs up but I wanted to thank you all for your help. I got it working.I ended up not reverting to a previous version and worked the problems instead.
I have a big DNS problem which I was able to fix. After that is was a simple question of setting the correct rules.
Again, thank you all for taking the time to help and point me in the right direction.
-
@pfsblah said in Can connect to OVPN Server and that's about it:
I can't give thumbs up
Gave you one