Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN - works for 1 WAN, issues with DUAL WAN

    Scheduled Pinned Locked Moved Routing and Multi WAN
    16 Posts 7 Posters 7.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H Offline
      heper
      last edited by

      run it on LAN interface an portforward from both wans to lan

      1 Reply Last reply Reply Quote 0
      • ? This user is from outside of this forum
        Guest
        last edited by

        @heper:

        run it on LAN interface an portforward from both wans to lan

        thanks for the suggestion,
        i tried out of desperation, no go
        NAT shouldn't be in play here at all

        1 Reply Last reply Reply Quote 0
        • ? This user is from outside of this forum
          Guest
          last edited by

          UPDATE:

          I have:
          WAN1 = cable
          WAN2 = dsl

          With identical VPN server and firewall settings, i can't connect on WAN2 only.
          OpenVPN log shows "TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)"
          I've been able to connect on WAN2 before, but not anymore, no matter what i try.

          Why would OpenVPN work on WAN1 and not WAN2?

          1 Reply Last reply Reply Quote 0
          • H Offline
            heper
            last edited by

            firewall rules or if dsl-router is in between, missing portforwards, blocks at isp level, …

            1 Reply Last reply Reply Quote 0
            • M Offline
              mrfairsquare
              last edited by

              I have the exact same issue. Did you ever figure it out?

              1 Reply Last reply Reply Quote 0
              • ? This user is from outside of this forum
                Guest
                last edited by

                no solution, gave up, waiting for 2.1 to try again

                is documentation outdated or is there something inherently wrong with a single openvpn server listening on all interfaces?
                this suggests running 2 openvpn servers http://doc.pfsense.org/index.php/Multi-WAN_OpenVPN

                1 Reply Last reply Reply Quote 0
                • H Offline
                  heper
                  last edited by

                  there is no reason why it wouldn't work … i currently have it working on multiple sites.

                  1 Reply Last reply Reply Quote 0
                  • ? This user is from outside of this forum
                    Guest
                    last edited by

                    It seems it only works on whichever of the two WANs the 'default' gateway at the time as shows under diagnostic>routes

                    What can i do about this to be able to connect to either?

                    1 Reply Last reply Reply Quote 0
                    • ? This user is from outside of this forum
                      Guest
                      last edited by

                      tried something random,

                      got non-default WAN2 working by switching OpenVPN to tcp mode,
                      am i really the only one to ever come across this?
                      tcp isn't ideal, is there a workaround to be able to use udp?

                      @themisa:

                      It seems it only works on whichever of the two WANs the 'default' gateway at the time as shows under diagnostic>routes

                      What can i do about this to be able to connect to either?

                      1 Reply Last reply Reply Quote 0
                      • D Offline
                        dhatz
                        last edited by

                        Since you mention a different behavior between TCP and UDP, have you by any chance enabled NAT reflection for port forwards ? (under System -> Advanced -> Firewall & NAT)

                        1 Reply Last reply Reply Quote 0
                        • ? This user is from outside of this forum
                          Guest
                          last edited by

                          No, it's disabled (default)

                          ok. this http://forum.pfsense.org/index.php/topic,8297.msg46717.html seems identical,
                          i tried this as per their suggestion, didn't help.

                          pf wiki http://doc.pfsense.org/index.php/Multi-WAN_OpenVPN
                          mentions 'udp caveats' at the top, and it suggests running 2 vpn server which i tried

                          to recap:
                          single openvpn server with 'any' for interface and 'tcp' allows me to connect from either WAN,
                          'udp' only works on 'default gateway' which is the problem

                          1 Reply Last reply Reply Quote 0
                          • D Offline
                            dhatz
                            last edited by

                            Well, then perhaps heper could share the way he configured it.

                            1 Reply Last reply Reply Quote 0
                            • S Offline
                              StrangeAttractor
                              last edited by

                              Hi all,

                              I used the links from themisa to help configure multi-wan OpenVPN for a non pf-sense router, but what was missing is that in addition to adding a 'local $IP' line to the duplicated config, you need to change the subnet for for VPN connections, having the DHCP address pools separated, but on the same subnet was not sufficient.

                              Hope that helps.

                              1 Reply Last reply Reply Quote 0
                              • S Offline
                                Soyokaze
                                last edited by

                                @themisa:

                                No, it's disabled (default)

                                ok. this http://forum.pfsense.org/index.php/topic,8297.msg46717.html seems identical,
                                i tried this as per their suggestion, didn't help.

                                pf wiki http://doc.pfsense.org/index.php/Multi-WAN_OpenVPN
                                mentions 'udp caveats' at the top, and it suggests running 2 vpn server which i tried

                                to recap:
                                single openvpn server with 'any' for interface and 'tcp' allows me to connect from either WAN,
                                'udp' only works on 'default gateway' which is the problem

                                add to advanced options of openvpn client:
                                local 127.0.0.1;lport 0
                                Set "Interface" to any real interface, but NOT "any" (otherwise OpenVPN will not start).
                                In Gateway groups add group what suits your need (WAN as Tier 1, Second WAN as Tier 2 in your case);
                                in Rules add floating rule with following settings:
                                Quick: Enabled
                                Interface: select both WAN interfaces
                                direction: out
                                Proto: TCP/UDP or plain TCP
                                Source: Any
                                Destination: IP of OpenVPN server to whom you connecting
                                Dest port range: add your ports
                                Gateway: Choose previously created Gateway group.

                                Should work (although without failback)

                                Need full pfSense in a cloud? PM for details!

                                1 Reply Last reply Reply Quote 0
                                • X Offline
                                  xternal
                                  last edited by

                                  I have same issue.
                                  On my OVPN server, i can have either of the vpn connections up if the other one is down. The log produces this:

                                  Oct 5 14:42:24 php: /status_interfaces.php: Starting 3gstats.php on device '' for interface 'wan'
                                  Oct 5 14:42:29 check_reload_status: Reloading filter
                                  Oct 5 14:42:32 php: : Gateways status could not be determined, considering all as up/active.
                                  Oct 5 14:42:34 php: : Resyncing OpenVPN instances for interface WAN.
                                  Oct 5 14:42:34 kernel: ovpns1: link state changed to UP
                                  Oct 5 14:42:34 kernel: ifa_add_loopback_route: insertion failed
                                  Oct 5 14:42:34 kernel: ovpns1: link state changed to DOWN

                                  If ovpns1 is up then the log changes to ovpns2: if_add_loopaback_route: insertion failed etc.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.