Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Openvpn routing issue

    Scheduled Pinned Locked Moved OpenVPN
    19 Posts 3 Posters 9.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jonnytabpni
      last edited by

      I think this boils down to the fact that the IPSEC interface seems to somewhat be "seperate" from the static routing section…

      The fact that both pfsense shells can't ping hosts on the respective other side of the IPSEC vpn (nothing to do with the openvpn link) says something...

      1 Reply Last reply Reply Quote 0
      • Cry HavokC
        Cry Havok
        last edited by

        OpenVPN != IPsec ;)

        It sounds like a routing problem and I'd suggest you read the OpenVPN documentation on the OpenVPN website.  Problems like your describing usually come down routing problems.

        Is the pfSense host the default gateway for each network.  If not do the hosts know that they need to use the pfSense host as a route to the remote subnet.  At the remote end, do the hosts know the route back?

        I use OpenVPN for remote access and tunnels.  By following the documentation I had no trouble getting it working.  If you haven't already read the documentation (How-To and FAQ in particular) on the OpenVPN site I'd suggest you do that now.

        1 Reply Last reply Reply Quote 0
        • J
          jonnytabpni
          last edited by

          Hi Cry Halvok,

          I have read the OpenVPN docs and I can't find anything relating to this problem.

          I think it is pfsense which has this problem with using static routes and IPSEC tunnels.

          Basically, if you have a static route telling pfsense2's local network how to get back to the openvpn client, it just ignores it (or at least ignor some allow rule along the way…).

          Is there any reason why the pfsense shell can't use the ipsec tunnel?

          BTW what do you mean by IPSEC != Openvpn?

          I know that they are completly different types of VPN. But if you look at my network diagram, I am trying to let an openvpn client access a host connected to the opposite end of an IPSEC tunnel :)

          P.S. To answer your question, yes, a pfsense box (wheather it be pfsense1 or pfsense2) is the default gateway for what respective network you are talking about.

          1 Reply Last reply Reply Quote 0
          • J
            jits
            last edited by

            After the flood in the days of Noah, the Gods, forbade their sons from sleeping with the daughters of man. Thus, mixing of their DNA with that of human DNA was and still is a very big no, no!

            Then and therefore…IPSEC != OpenVPN. The Gods have forbidden it.

            Thats why I said either your solution will be IPSEC server for IPSEC clients or it will be OpenVPN Server for OpenVPN Clients.

            Your network should look like this....

            [LAN] –[PFSENSE OPENVPN SITE A]– (Internet) --[PFSENSE OPENVPN SITE B]– [LAN]

            I believe after you set up the site to site OpenVPN tunnel, you'll have to setup another OpenVPN server tunnel for clients to connect…either to Site A or Site B, your choice.

            That way, you should be able to push routes no problem between networks. Aside from that, my feeling is that IPSEC is not compatible with OpenVPN and we really ought to make it as simple as possible.

            Now c'mon guys...do I really have to resort to something like Kerio Winroute or Wingate? These things do work, but it's just not the same.

            1 Reply Last reply Reply Quote 0
            • J
              jonnytabpni
              last edited by

              Hi Jits,

              Your your saying replace my IPSEC tunnel with an openVPN site-site tunnel?

              1 Reply Last reply Reply Quote 0
              • Cry HavokC
                Cry Havok
                last edited by

                OpenVPN is an SSL based VPN.  It isn't IPsec and doesn't work with IPsec endpoints.

                Time to take baby steps ;)

                1. Can pfSense1 ping the LAN interface of pfSense2?  What about the other way around?
                  a) If that doesn't work then your IPsec tunnel is the problem

                2. Can a host on the pfSense1 LAN ping the LAN interface of pfSense2?  What about the other way around?
                  a) If that doesn't work then routing or firewall configuration is the problem

                1 Reply Last reply Reply Quote 0
                • J
                  jonnytabpni
                  last edited by

                  Hi Cry Halvok,

                  I think you have misunderstood me.
                  I have a relativley good knowledge of VPNs and networking.

                  Where have I said that I have tried to connect an openvpn client to an ipsec endpoint?

                  My IPSEC tunnel works fine and has been for a year or so (hosts connected to pfsense1 can ping hosts connected to pfsense 2 and vice versa) - the only exception to this rule is that by loging into the shell of either pfsense box, the other lan isn't reachable (But this is just "on the side")

                  My issue is simple:

                  I can't make my openvpn client ping a host connected to pfsense 2 (via routing through the ipsec tunnel)

                  1 Reply Last reply Reply Quote 0
                  • J
                    jits
                    last edited by

                    Right, so then it would make sense then for you to setup a parallel VPN, if thats possible.

                    You've got IPSEC and that works fine, now it appears you'll have to setup Open VPN site to site.
                    Then your OpenVPN clients should function, but what version of PFsense are you using?

                    1 Reply Last reply Reply Quote 0
                    • Cry HavokC
                      Cry Havok
                      last edited by

                      Does pfSense2 know how to route traffic back to the OpenVPN subnet(s)?  Remember, no NAT occurs on the OpenVPN interfaces so you have to ensure that the routes are known.

                      1 Reply Last reply Reply Quote 0
                      • J
                        jonnytabpni
                        last edited by

                        Hi Cry,

                        I'm honesty not sure how to use netstat properly on BSD (Can use "route" ok on Linux but pfsense is not Linux :D)

                        What is the command to check?

                        What is weird is that all hosts connected to pfsense2 use it as their default gateway and can access the other end of the IPSEC tunnel just fine. This is what beats me. I can only assume that it does know how (otherwise it woudn't be able to help the other hosts) but I dunno…

                        :)

                        1 Reply Last reply Reply Quote 0
                        • J
                          jonnytabpni
                          last edited by

                          ok I did a netstat -rn on pfsense2 (which has a local LAN subnet of 10.87.1.0/24):

                          Internet:
                          Destination        Gateway            Flags    Refs      Use  Netif Expire
                          default            xx.xx.xx.xx         UGS         0 21657900    vr0
                          10.87.1.0/24       link#4             UC          0        0    rl0
                          10.87.1.1          00:00:b5:6b:d9:91  UHLW        1        0    lo0
                          10.87.1.10         00:11:32:04:04:b7  UHLW        1      212    rl0    622
                          10.87.1.21         00:50:ba:fb:ed:de  UHLW        1     3127    rl0    977
                          10.87.1.22         00:1a:4d:53:f2:08  UHLW        1    30910    rl0   1052
                          10.87.1.24         00:40:10:20:00:03  UHLW        1     8993    rl0    210
                          10.87.10.0/24      10.87.10.2         UGS         0        0   tun0
                          10.87.10.2         10.87.10.1         UH          1        0   tun0
                          10.87.11.0/24      10.87.11.2         UGS         0    40016   tun1
                          10.87.11.2         10.87.11.1         UH          1        0   tun1
                          xx.xx.xx.x/22      link#3             UC          0        0    vr0
                          xx.xx.xx.xx         00:06:2a:ce:38:01  UHLW        2       65    vr0    413
                          xx.xx.xx.xx       127.0.0.1          UGHS        0        0    lo0
                          127.0.0.1          127.0.0.1          UH          1   141721    lo0

                          It apperas that pfsense 1's LAN subnet (10.87.0.0/24) does not appear in the list. How would I add this? I just find it very strange that hosts using pfsense2 as a default gateway can reach pfsense1's subnet.

                          1 Reply Last reply Reply Quote 0
                          • Cry HavokC
                            Cry Havok
                            last edited by

                            Does the default gateway (that you've blanked out) know how to reach the pfSense1 subnet?  That would explain your last statement.

                            As for adding it, do it through the pfSense GUI on pfSense2.  I'm nowhere near mine right now so can't provide pointers.

                            1 Reply Last reply Reply Quote 0
                            • J
                              jonnytabpni
                              last edited by

                              Hi Cry,

                              No it doesn't. The one I've blanked out is the ISP's gateway (which is on pfsense 2's WAN).

                              Still confused about how the other hosts connected to pfsense2 can reach the pfsense1 subnet

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.