Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    External access to a internal web server (VPN site2site)

    Scheduled Pinned Locked Moved General pfSense Questions
    13 Posts 3 Posters 169 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @Wagner 0
      last edited by

      @Wagner-0
      Did you create a Client specific override in OpenVPN on the server?

      Did you add the subnet of Ubuntu C to the "remote networks" in the client config?

      W 4 Replies Last reply Reply Quote 0
      • W
        Wagner 0 @viragomann
        last edited by

        @viragomann, first of all, thanks for your help!

        I did try to create a Client specific override in OpenVPN on the server, but it didn't work.

        When you sayed to add the subnet of Ubuntu C to the "remote networks", you are saing on the Client specific override configurations in OpenVPN on the server, right?

        I will post some printscreen of my configuration to try to help me.

        Server OpenVPN configuration printscreen:
        Captura de tela 2025-05-22 062827.png
        Captura de tela 2025-05-22 062851.png
        Captura de tela 2025-05-22 062920.png
        Captura de tela 2025-05-22 062947.png
        Captura de tela 2025-05-22 063007.png
        Captura de tela 2025-05-22 063025.png
        Captura de tela 2025-05-22 063045.png
        Captura de tela 2025-05-22 063112.png
        Captura de tela 2025-05-22 063148.png
        It is the configuration of Client specific override:
        Captura de tela 2025-05-22 063241.png
        This is a firewall status when I try to connect with Ubuntu C (10.66.100.10)
        Captura de tela 2025-05-22 063806.png

        1 Reply Last reply Reply Quote 0
        • W
          Wagner 0 @viragomann
          last edited by

          @viragomann, client OpenVPN configuration printscreen:
          Captura de tela 2025-05-22 063337.png
          Captura de tela 2025-05-22 063312.png
          Captura de tela 2025-05-22 063412.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by stephenw10

            You might need an outbound NAT rule on the server side OpenVPN assigned interface for traffic coming from external addresses.

            Without that replies from Ubuntu B may be leaving the client dircetly back to Ubuntu C since it's in the WAN subnet directly.

            However, the reply-to tagging on the pass rule at the OpenVPN client should override it if you are passing traffic on the assigned interface. But it looks like you have pass all rules on the OpenVPN group interface also which do not get reply-to tags.

            So first off disable or remove the pass rules on the OpenVPN interfaces in favour of the assigned ovpn interfaces which I assume is OPT1 at each end.

            This should definitely be possible.

            Check the states at both ends to see where traffic is going if it still fails.

            W 1 Reply Last reply Reply Quote 0
            • W
              Wagner 0 @viragomann
              last edited by

              @viragomann
              Captura de tela 2025-05-22 063456.png
              Captura de tela 2025-05-22 063442.png
              Captura de tela 2025-05-22 063515.png

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Yeah assuming OPT1 is the assigned OpenVPN interface you must pass the traffic there and not on the OpenVPN group interface in order to get reply-to tagging on the states.

                So add a pass rule on OPT1 and disable the rule on OpenVPN.

                1 Reply Last reply Reply Quote 0
                • W
                  Wagner 0 @viragomann
                  last edited by

                  @viragomann, posted the rest of images:

                  Captura de tela 2025-05-22 063533.png
                  Captura de tela 2025-05-22 063605.png

                  Ubuntu C:
                  Captura de tela 2025-05-22 065446.png

                  V 1 Reply Last reply Reply Quote 0
                  • W
                    Wagner 0 @stephenw10
                    last edited by

                    @stephenw10, thanks for your help!

                    I will check your recommendation when I arrive at my home.

                    Thanks again!

                    1 Reply Last reply Reply Quote 1
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by stephenw10

                      You still have the rules on the wrong tab at the client so reply-to will not be applied.

                      Edit: OK let us know if that helps.

                      W 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @Wagner 0
                        last edited by

                        @Wagner-0
                        I cannot give better suggestions than @stephenw10.
                        You need to enable the reply-to tagging on the client. This requires that the pass rule on the dedicated VPN interface has to be applied to the forwarded traffic.
                        However, rules on the OpenVPN tab (group) have precedence over member interface rules. That's why you have to remove these rules.

                        W 1 Reply Last reply Reply Quote 1
                        • W
                          Wagner 0 @stephenw10
                          last edited by

                          @stephenw10, thank you very much for your help! It is working!

                          1 Reply Last reply Reply Quote 1
                          • W
                            Wagner 0 @viragomann
                            last edited by

                            @viragomann, thank you very much for your help!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.