Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Why can I not reach my clients from the LAN?

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 5 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      Well - For me, it just works.

      Are you exporting your configuration via client export package or manually finger poking it?

      (assuming you don't have overlapping network subnets, this should also just work for you)

      1 Reply Last reply Reply Quote 0
      • J
        jg3
        last edited by

        I'm exporting it with the client export utility.  The client config looks like this:

        
        dev tun
        persist-tun
        persist-key
        cipher AES-256-CBC
        tls-client
        client
        resolv-retry infinite
        remote 66.77.67.200 443 tcp
        tls-remote pfSense-cert
        auth-user-pass
        pkcs12 pfSense-TCP-443-jg3.p12
        tls-auth pfSense-TCP-443-jg3-tls.key 1
        
        

        I'll note that this firewall was installed fresh on 2.0.3, no upgrade to get here.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          Firewalls on the client?

          1 Reply Last reply Reply Quote 0
          • J
            jg3
            last edited by

            see reply #2 ?

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              I don't know - Using a windows machine with similar system ping and SSH both work.

              1 Reply Last reply Reply Quote 0
              • P
                phil.davis
                last edited by

                Do you have any firewall rules with policy-routing on LAN? Those might be forcing new flows initiated from LAN down a real WAN. But to get to the OpenVPN clients pfSense needs to just give the packet/flow to the ordinary routing for delivery.
                Or a firewall rule on LAN that ends up blocking traffic to the OpenVPN tunnel network?

                As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  Do you have latest version of Viscosity installed?

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Are you doing something weird with your nats?  Are you setup for automatic or manual?

                    That route looks correct to me.  If your clients are 10.16.2.0/24

                    What does traceroute from lan box to vpn client do?  your lan boxes are pointing to this pfsense box as their default gateway? And what is the mask on the lan clients?  You don't have a overlapping network do you where the lan clients think 10.16.2 is local to their connection?

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • J
                      jg3
                      last edited by

                      @phil.davis:

                      Do you have any firewall rules with policy-routing on LAN? Those might be forcing new flows initiated from LAN down a real WAN. But to get to the OpenVPN clients pfSense needs to just give the packet/flow to the ordinary routing for delivery.
                      Or a firewall rule on LAN that ends up blocking traffic to the OpenVPN tunnel network?

                      Thanks for the help.  I understand what you're saying, but it seems like "pfSense … just giv[ing] the packet/flow to the ordinary routing for delivery" is not happening for some reason.

                      I don't have any policy-routing at all.

                      My firewall rules are all very simple:

                      • Allow anything from the LAN outbound (Default LAN to any rule)

                      • Allow anything from anywhere on the OpenVPN rule tab (Default OpenVPN wizard rule)

                      WAN rules don't apply in this case, but they are:

                      • allow traffic for one port in to a 1:1 NAT'ed host
                      • allow traffic in to the firewall IP on TCP:443 for OpenVPN
                      1 Reply Last reply Reply Quote 0
                      • J
                        jg3
                        last edited by

                        @doktornotor:

                        Do you have latest version of Viscosity installed?

                        Yes.  1.4.4.

                        1 Reply Last reply Reply Quote 0
                        • J
                          jg3
                          last edited by

                          @johnpoz:

                          Are you doing something weird with your nats?  Are you setup for automatic or manual?

                          That route looks correct to me.  If your clients are 10.16.2.0/24

                          What does traceroute from lan box to vpn client do?  your lan boxes are pointing to this pfsense box as their default gateway? And what is the mask on the lan clients?  You don't have a overlapping network do you where the lan clients think 10.16.2 is local to their connection?

                          I have automatic NAT.    LAN hosts use the pfSense firewall as their default gateway.  LAN hosts have /24 mask, the LAN and VPN client networks do not overlap (10.16.23.0/24 v. 10.16.2.0/24).

                          Traceroute from the LAN host to the VPN client address hits the firewall and hangs:

                          
                          jge@bigsister:~$ traceroute -n 10.16.2.10
                          traceroute to 10.16.2.10 (10.16.2.10), 30 hops max, 60 byte packets
                           1  10.16.23.1  0.241 ms  0.210 ms  0.197 ms
                           2  * * *
                           3  * * *
                           4  * * *
                           5  * * *
                          
                          

                          The LAN host here, is 1:1 NAT'ed behind a public IP (not the firewall's).    That's the only thing I can imagine is problematic, but I'm not sure how to pinpoint / fix it.

                          1 Reply Last reply Reply Quote 0
                          • J
                            jg3
                            last edited by

                            @jg3:

                            The LAN host here, is 1:1 NAT'ed behind a public IP (not the firewall's).    That's the only thing I can imagine is problematic, but I'm not sure how to pinpoint / fix it.

                            Fixed!  Thanks for the help johnpoz, your questions set me in the right direction (finally).

                            I disabled a 1:1 NAT rule I had created that applied to the LAN host on the OpenVPN interface and now the LAN machine can reach the VPN clients.  Great.

                            I had implemented this rule to cover a corner case of no-split VPN clients needing NAT reflection, discussed here:
                            http://forum.pfsense.org/index.php/topic,65793.msg359377.html

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.