• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

PFSense 2.0 - Not able to bridge tap VPN.

Scheduled Pinned Locked Moved OpenVPN
31 Posts 12 Posters 16.3k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    dig1234
    last edited by Dec 1, 2011, 6:37 PM

    I've got that fix package installed and indeed it makes smart changes to the GUI, but still no dice for me.  I cannot for the life of me get pings to work from the clients. I know the tunnel is working because I can actually see some layer 2 traffic going across the tunnel (ARP broadcasts, multicasts) with tcpdump. But pinging etc will not work even to the pfsense box itself. It feels like a firewall issue but I've got allow * rules on all interfaces including the OPT1 bridge.
    Been struggling with this for a week any suggestions?
    Here is my tap config:

    tap.jpg
    tap.jpg_thumb

    1 Reply Last reply Reply Quote 0
    • J
      jimp Rebel Alliance Developer Netgate
      last edited by Dec 1, 2011, 6:43 PM

      Show the output of "ifconfig -a"

      Also if you switched between tun/tap on an existing connection, you must reboot. An unfortunate fact of dealing with tap interfaces.

      New connections should be fine for that, you just need to make sure they're assigned and bridged to LAN on both sides.

      Remember: Upvote with the πŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • D
        dig1234
        last edited by Dec 1, 2011, 7:08 PM

        Here is the output (note:the lan iface is dot1q trunked into the switch.)

        em0: flags=8943 <up,broadcast,running,promisc,simplex,multicast>metric 0 mtu 150                                                                                                0
                options=9b <rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum>ether 00:0c:29:af:78:7e
                inet6 fe80::20c:29ff:feaf:787e%em0 prefixlen 64 scopeid 0x1
                inet 10.0.1.253 netmask 0xffffff00 broadcast 10.0.1.255
                nd6 options=3 <performnud,accept_rtadv>media: Ethernet autoselect (1000baseT <full-duplex>)
                status: active
        plip0: flags=8810 <pointopoint,simplex,multicast>metric 0 mtu 1500
        lo0: flags=8049 <up,loopback,running,multicast>metric 0 mtu 16384
                options=3 <rxcsum,txcsum>inet 127.0.0.1 netmask 0xff000000
                inet6 ::1 prefixlen 128
                inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3
                nd6 options=3 <performnud,accept_rtadv>pfsync0: flags=0<> metric 0 mtu 1460
                syncpeer: 224.0.0.240 maxupd: 128 syncok: 1
        pflog0: flags=100 <promisc>metric 0 mtu 33200
        enc0: flags=0<> metric 0 mtu 1536
        em0_vlan2: flags=8943 <up,broadcast,running,promisc,simplex,multicast>metric 0 m                                                                                                tu 1500
                options=3 <rxcsum,txcsum>ether 00:0c:29:af:78:7e
                inet6 fe80::20c:29ff:feaf:787e%em0_vlan2 prefixlen 64 scopeid 0x7
                inet 10.0.6.253 netmask 0xffffff00 broadcast 10.0.6.255
                nd6 options=3 <performnud,accept_rtadv>media: Ethernet autoselect (1000baseT <full-duplex>)
                status: active
                vlan: 2 parent interface: em0
        bridge0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
                ether f2:39:a5:31:42:98
                id 00:00:00:00:00:00 priority 32768 hellotime 2 fwddelay 15
                maxage 20 holdcnt 6 proto rstp maxaddr 100 timeout 1200
                root id 00:00:00:00:00:00 priority 32768 ifcost 0 port 0
                member: ovpns1 flags=143 <learning,discover,autoedge,autoptp>ifmaxaddr 0 port 9 priority 128 path cost 2000000
                member: em0_vlan2 flags=143 <learning,discover,autoedge,autoptp>ifmaxaddr 0 port 7 priority 128 path cost 20000
        ovpns1: flags=8943 <up,broadcast,running,promisc,simplex,multicast>metric 0 mtu                                                                                                  1500
                options=80000 <linkstate>ether 00:bd:39:07:00:01
                inet6 fe80::2bd:39ff:fe07:1%ovpns1 prefixlen 64 scopeid 0x9
                nd6 options=3 <performnud,accept_rtadv>Opened by PID 48350
        ovpns3: flags=8051 <up,pointopoint,running,multicast>metric 0 mtu 1500
                options=80000 <linkstate>inet6 fe80::20c:29ff:feaf:787e%ovpns3 prefixlen 64 scopeid 0xa
                inet 10.0.7.1 –> 10.0.7.2 netmask 0xffffffff
                nd6 options=3 <performnud,accept_rtadv>Opened by PID 13380
        tun1: flags=8010 <pointopoint,multicast>metric 0 mtu 1500
                options=80000 <linkstate>pptpd0: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd1: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd2: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd3: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd4: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd5: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd6: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd7: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd8: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd9: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd10: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd11: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd12: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd13: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd14: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500
        pptpd15: flags=8890 <pointopoint,noarp,simplex,multicast>metric 0 mtu 1500</pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></pointopoint,noarp,simplex,multicast></linkstate></pointopoint,multicast></performnud,accept_rtadv></linkstate></up,pointopoint,running,multicast></performnud,accept_rtadv></linkstate></up,broadcast,running,promisc,simplex,multicast></learning,discover,autoedge,autoptp></learning,discover,autoedge,autoptp></up,broadcast,running,simplex,multicast></full-duplex></performnud,accept_rtadv></rxcsum,txcsum></up,broadcast,running,promisc,simplex,multicast></promisc></performnud,accept_rtadv></rxcsum,txcsum></up,loopback,running,multicast></pointopoint,simplex,multicast></full-duplex></performnud,accept_rtadv></rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum></up,broadcast,running,promisc,simplex,multicast>

        1 Reply Last reply Reply Quote 0
        • J
          jimp Rebel Alliance Developer Netgate
          last edited by Dec 1, 2011, 7:12 PM

          That appears to be OK at a glance. Looks about like my VM test setup that works (though it doesn't use vlans)

          Remember: Upvote with the πŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • D
            dig1234
            last edited by Dec 1, 2011, 7:17 PM

            that's exactly what it is, if this works then I get to buy me real hardware to use for pfSense. The vlan part of it works fine, I can ping on lan etc. But what to do about TAP?! driving me crazy.
            How can I test firewall rules?

            1 Reply Last reply Reply Quote 0
            • J
              jimp Rebel Alliance Developer Netgate
              last edited by Dec 1, 2011, 7:19 PM

              Set the rules you have to log - if the packets hit the rule and log as being passed, then firewall rules are not your problem.

              Doing captures on the tap interface on both ends while you try can help.

              Is this a site-to-site or are you bridging in remote access clients?

              Remember: Upvote with the πŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • D
                dig1234
                last edited by Dec 2, 2011, 7:38 PM

                Ok- I solved it. There is a problem with bridging the vlan interface. Either a bug or a incompatibility. I noticed a message on the console something to the effect of problem adding the vlan-iface to bridge0. (I had only been using ssh so hadn't seen the message) So I switched off a vlan interface to a real one and all was copacetic. Too many variables makes for a tough diagnosis.. Thanks for your help!

                1 Reply Last reply Reply Quote 0
                • S
                  sbeaudoin
                  last edited by Dec 10, 2011, 4:33 PM

                  Tugi, I tried your suggestion, but now, OpenVPN do not want to start with "–server and --server-bridge cannot be used together".  How did you overcome this?

                  1 Reply Last reply Reply Quote 0
                  • S
                    sbeaudoin
                    last edited by Dec 10, 2011, 4:47 PM

                    Forget it, I installed the OpenVPN patch and it works great!  Thank you.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mglm22
                      last edited by Dec 30, 2011, 10:23 AM

                      Hi,

                      Thanks to Jimp for the ovpn bridge fixes in 2.1 which worked great in my testing.  (Spent a lot of time trying to get 2.0 and 2.0.1 to work but never succeded).

                      Is there or will there be a way to specify the client IP address connecting to the OVPN bridge in the GUI?  I currently use this for some clients whose IP address must remain static on the bridge.  I am guessing I could put the ifconfig-pool-persist directive in the advanced configuration but was wondering where the file (with the respective client to IP address) the directive points to should be saved?

                      2.1-DEVELOPMENT (i386)
                      built on Fri Nov 25 17:45:38 EST 2011
                      FreeBSD 8.1-RELEASE-p6

                      1 Reply Last reply Reply Quote 0
                      • J
                        jimp Rebel Alliance Developer Netgate
                        last edited by Dec 30, 2011, 12:43 PM

                        Probably would work with something to make the IP static in a client-specific override entry. Not sure what it would be offhand for a tap IP, but I thought it was supported (I know it is for tun, but the syntax is likely different)

                        Remember: Upvote with the πŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received