Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense - OpenVPN - Pfsense - no traffic

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 3 Posters 5.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      marvosa
      last edited by

      Probably firewall related, but could be routing….  hard to tell without seeing what you have configured.  Post info requested please.

      1 Reply Last reply Reply Quote 0
      • K
        KJR
        last edited by

        Server1.conf is for remote access from home.

        Here are the conf from the VPN Tunnel.

        server2.conf:

        dev ovpns2
        dev-type tun
        dev-node /dev/tun2
        writepid /var/run/openvpn_server2.pid
        #user nobody
        #group nobody
        script-security 3
        daemon
        keepalive 10 60
        ping-timer-rem
        persist-tun
        persist-key
        proto udp
        cipher AES-256-CBC
        up /usr/local/sbin/ovpn-linkup
        down /usr/local/sbin/ovpn-linkdown
        local xxx.xxx.11.2
        ifconfig 192.168.80.1 192.168.80.2
        lport 1195
        management /var/etc/openvpn/server2.sock unix
        push "route xxx.xxx.10.0 255.255.255.128"
        route xxx.xxx.10.128 255.255.255.128
        secret /var/etc/openvpn/server2.secret
        push route "xxx.xxx.10.0 255.255.255.248"
        push route "192.168.64.0 255.255.255.0"

        Client1.conf:

        dev ovpnc1
        dev-type tun
        dev-node /dev/tun1
        writepid /var/run/openvpn_client1.pid
        #user nobody
        #group nobody
        script-security 3
        daemon
        keepalive 10 60
        ping-timer-rem
        persist-tun
        persist-key
        proto udp
        cipher AES-256-CBC
        up /usr/local/sbin/ovpn-linkup
        down /usr/local/sbin/ovpn-linkdown
        local xxx.xxx.11.5
        lport 1195
        management /var/etc/openvpn/client1.sock unix
        remote xxx.xxx.11.2 1195
        ifconfig 192.168.80.2 192.168.80.1
        route xxx.xxx.10.0 255.255.255.128
        secret /var/etc/openvpn/client1.secret

        OpenVPN Rules are ANY/ANY allowed.

        1 Reply Last reply Reply Quote 0
        • M
          marvosa
          last edited by

          you can leave the local and remote statements masked as they are public, but you can unmask your push route and route statements… since they are reserved addresses.  We need to see them if we're going troubleshoot effectively.

          I see some possible issues, but need those ranges unmasked.

          Also, can you communicate with your DMZ from the LAN on server-side?

          1 Reply Last reply Reply Quote 0
          • P
            phil.davis
            last edited by

            push "route xxx.xxx.10.0 255.255.255.128"
            route xxx.xxx.10.128 255.255.255.128
            secret /var/etc/openvpn/server2.secret
            push route "xxx.xxx.10.0 255.255.255.248"
            push route "192.168.64.0 255.255.255.0"
            

            The 2nd (middle) push route is certainly not needed - it is a subnet of the 1st (top) one.
            I think the correct syntax is:

            push "route 192.168.64.0 255.255.255.0"
            

            The 1st (top) one has the correct syntax, the others have the quote in the wrong place.
            Maybe it is as simple as that?
            Otherwise post firewall rules also.

            As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
            If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

            1 Reply Last reply Reply Quote 0
            • K
              KJR
              last edited by

              Ok, here is the modified server1.conf:

              dev ovpns2
              dev-type tun
              dev-node /dev/tun2
              writepid /var/run/openvpn_server2.pid
              #user nobody
              #group nobody
              script-security 3
              daemon
              keepalive 10 60
              ping-timer-rem
              persist-tun
              persist-key
              proto udp
              cipher AES-256-CBC
              up /usr/local/sbin/ovpn-linkup
              down /usr/local/sbin/ovpn-linkdown
              local xxx.xxx.11.2
              ifconfig 192.168.80.1 192.168.80.2
              lport 1195
              management /var/etc/openvpn/server2.sock unix
              push "route 170.198.10.0 255.255.255.128"
              route 170.198.10.128 255.255.255.128
              secret /var/etc/openvpn/server2.secret
              push "route 192.168.64.0 255.255.255.0"

              Client1.conf:

              dev ovpnc1
              dev-type tun
              dev-node /dev/tun1
              writepid /var/run/openvpn_client1.pid
              #user nobody
              #group nobody
              script-security 3
              daemon
              keepalive 10 60
              ping-timer-rem
              persist-tun
              persist-key
              proto udp
              cipher AES-256-CBC
              up /usr/local/sbin/ovpn-linkup
              down /usr/local/sbin/ovpn-linkdown
              local xxx.xxx.11.5
              lport 1195
              management /var/etc/openvpn/client1.sock unix
              remote xxx.xxx.11.2 1195
              ifconfig 192.168.80.2 192.168.80.1
              route 170.198.10.0 255.255.255.128
              secret /var/etc/openvpn/client1.secret

              The only rule on the OpenVPN tab is to allow all traffic.

              I am able to communicate to the DMZ from the LAN on the server side without issue.  I cannot access from the client LAN side.

              Thanks again for all the help.

              1 Reply Last reply Reply Quote 0
              • M
                marvosa
                last edited by

                So, you're using public IP's on your LAN… Why?  It may or may not be the main issue, but that should be changed.  Check your firewall logs for blocks.

                After the correction with the quotation mark placement by phil.davis and both DMZ and OpenVPN have any/any rules on the firewall?  It should be working.... but your tunnel network and DMZ are private... while the LAN on both sides are using publicly addressable IP's.... that HAS to be causing confusion somewhere.

                1 Reply Last reply Reply Quote 0
                • K
                  KJR
                  last edited by

                  Yeah…I walked into this mess with the public IPs being used, still not sure why they did that.

                  I need to make a project to correct that first before I proceed.  After that I will revisit.  Thanks again for your help.

                  1 Reply Last reply Reply Quote 0
                  • K
                    KJR
                    last edited by

                    I made some changes and have a WIP to change the public addresses to 10.x.x.x on my lan.

                    When I try to traceroute to the DMZ 192.168.64.1 from the remote side it hits the firewall and routes it out the WAN interface instead of passing it across the VPN tunnel.

                    1 Reply Last reply Reply Quote 0
                    • M
                      marvosa
                      last edited by

                      Post new server1.conf and client1.conf and routing tables.

                      Also, what is the client-side using for an IP range?

                      1 Reply Last reply Reply Quote 0
                      • K
                        KJR
                        last edited by

                        server2.conf:

                        dev ovpns2
                        dev-type tun
                        dev-node /dev/tun2
                        writepid /var/run/openvpn_server2.pid
                        #user nobody
                        #group nobody
                        script-security 3
                        daemon
                        keepalive 10 60
                        ping-timer-rem
                        persist-tun
                        persist-key
                        proto udp
                        cipher AES-256-CBC
                        up /usr/local/sbin/ovpn-linkup
                        down /usr/local/sbin/ovpn-linkdown
                        local xxx.xxx.11.2
                        ifconfig 10.25.2.1 10.25.2.2
                        lport 1195
                        management /var/etc/openvpn/server2.sock unix
                        push "route 170.198.10.0 255.255.255.128"
                        route 10.25.1.0 255.255.255.0
                        secret /var/etc/openvpn/server2.secret

                        Client1.conf:

                        dev ovpnc1
                        dev-type tun
                        dev-node /dev/tun1
                        writepid /var/run/openvpn_client1.pid
                        #user nobody
                        #group nobody
                        script-security 3
                        daemon
                        keepalive 10 60
                        ping-timer-rem
                        persist-tun
                        persist-key
                        proto udp
                        cipher AES-256-CBC
                        up /usr/local/sbin/ovpn-linkup
                        down /usr/local/sbin/ovpn-linkdown
                        local xxx.xxx.11.5
                        lport 0
                        management /var/etc/openvpn/client1.sock unix
                        remote xxx.xxx.11.2 1195
                        ifconfig 10.25.2.2 10.25.2.1
                        route 170.198.10.0 255.255.255.128
                        secret /var/etc/openvpn/client1.secret

                        How do I export the routing tables?

                        My client side LAN is now: 10.25.1.0/24.

                        Thank you again for the help!

                        1 Reply Last reply Reply Quote 0
                        • M
                          marvosa
                          last edited by

                          You can either go to the shell and to a "netstat -r" or from the GUI it's Diagnostics -> Routes.

                          1 Reply Last reply Reply Quote 0
                          • K
                            KJR
                            last edited by

                            Well….I got it.

                            I started poking around the routing tables after the last msg.  I needed to put a static route to the DMZ using the openvpn IP as the gateway.  Once I did that and added the vendor static routes that exist on the primary firewall to the remote firewall it all worked.

                            Thanks marvosa for pushing me in the right direction.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.