Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to Site unable to connect remote LAN

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 4 Posters 4.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      itanis
      last edited by

      Hi,

      I am able to resolve the problem. Just to list here so it may help out others meeting with same issues. As mentioned, pfSense's firewall in SiteB is capturing the local LAN PC address from SiteA when attempting to ping or connect. What I thought is it should be reflecting SiteA's pfSense tunnel network address.

      What I did is to go to SiteA pfSense firewall, change to Manual NAT and add in a NAT rule for OpenVPN interface. Afterwhich, in SiteB pfSense firewall, it reflects SiteA's pfSense tunnel address when SiteA PC trying to connect. Upon doing this, the connection is established successfully.

      1 Reply Last reply Reply Quote 0
      • H
        heper
        last edited by

        i'm not sure if i'm reading this correctly but …. am i correctly interpreting that your WAN connection on pfsense-A is also on the 192.168.0.0/24 subnet ?

        if yes then you should investigate that... same subnet on LAN & WAN + vpn might be a problem

        1 Reply Last reply Reply Quote 0
        • C
          cmb
          last edited by

          @itanis:

          What I did is to go to SiteA pfSense firewall, change to Manual NAT and add in a NAT rule for OpenVPN interface. Afterwhich, in SiteB pfSense firewall, it reflects SiteA's pfSense tunnel address when SiteA PC trying to connect. Upon doing this, the connection is established successfully.

          This means you have a routing problem. It's a work around, but generally you don't want to NAT in that scenario, and it will break some things (MS file sharing and related MS protocols generally the only thing, they can't be NATed).

          1 Reply Last reply Reply Quote 0
          • S
            saxonbeta
            last edited by

            Indeed it is a routing problem. In pfsense A you have this:

            default   192.168.0.1   UGS   0   77702   1500   le0

            And in pfsense B:

            default   10.0.0.13   UGS   0   76104   1500   em0

            This means that your WAN connections are in the same subnets than both pfsense LANS. So you should change your choice of IP range for your both LANS.

            1 Reply Last reply Reply Quote 0
            • I
              itanis
              last edited by

              actually my WAN interface is disabled. the default route is what I put in my LAN interface as the gateway. Both the pfSense are not the main gateway of the network. does this still applies? Not sure if it invites much issues if I put it in this way

              1 Reply Last reply Reply Quote 0
              • C
                cmb
                last edited by

                @itanis:

                actually my WAN interface is disabled. the default route is what I put in my LAN interface as the gateway. Both the pfSense are not the main gateway of the network.

                There's your problem. You need a route back to the VPN in whatever is the default gateway, and depending on what is the default gateway, there may be other considerations like not trying to statefully filter the asymmetrically routed traffic, or not using devices like a Cisco PIX that can't route traffic back out the same interface it comes in on, amongst other possible routing or filtering difficulties inherent in such a setup.

                1 Reply Last reply Reply Quote 0
                • I
                  itanis
                  last edited by

                  Thanks cmb. Given my network setup:

                  LAN A – pfSense A -- Gateway(Router) ----<internet>---- Gateway(Firewall) ---- pfSense B -- LAN B

                  So I came with the thought, I do not need WAN IP in both pfSense. Thus I set default gateway in pfSense A/B with the internet gateway in order to get internet connection. For this, both pfSense A/B are only with LAN ip and without WAN ip.

                  Given this, I setup openvpn site to site with pfSense A and B. Which for sure default route(internet) will not be the VPN. Even though so far my NAT is giving 0 issues, I also want to take the chance to understand what is a more proper setup(which may benefits others as well), in this case is the routing issue so does that necessarily means if I set a default route or static route in pfSense B back to VPN gateway it will work?</internet>

                  1 Reply Last reply Reply Quote 0
                  • C
                    cmb
                    last edited by

                    You need a static route in your gateway on each side. On LAN A side, a route on gateway pointing LAN B subnet to pfSense A's IP. Same flipping the sides on the other end.

                    1 Reply Last reply Reply Quote 0
                    • I
                      itanis
                      last edited by

                      This make alot of sense. The key is the default gateway here I guess instead of pfSense in this setup. I'll give it a shot, its very beneficial. Thanks again.

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        Yeah the default gateway has to know how to reach that remote network.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.