Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Inter-Vlan Routing Accross VPN

    Scheduled Pinned Locked Moved OpenVPN
    47 Posts 4 Posters 21.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      If you want to pretend they are in a Public IP environment, with no NAT screwing with them, try this.

      Use a cheap off the shelf old router (like a linksys or belkin or whatever).  Use DHCP.
      Plug the WAN of each of your PFsense boxes into LAN ports on that router.
      Now, they should each get a IP and they shouln't be behind NAT.
      At this point they should be able to do whatever it is you are trying to make them do.
      However, this assumes TINC is working correctly and your settings are correct.
      I'm not sure what your LAN is like, but I know that a cheap dumb router should let you accomplish this.
      (Disclaimer - I've never set up TINC, so no idea if the package works.  My fingers are crossed)

      1 Reply Last reply Reply Quote 0
      • J
        jfinnigan
        last edited by

        Just an Update, I could never get TINC working it try to connect and does for a few mintine or so, and then fails..

        IPSEC works fine though.

        To bad pfsense doesn't have this: http://sourceforge.net/projects/opennhrp/

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          I'm glad its working…

          "NHRP, GRE and IPsec. It aims to be Cisco DMVPN compatible."

          I've had many many bad experiences with GRE and I avoid it like the plague, but I'll take a look it this.

          Are you still on pfsense then?

          Other than simply "IPSEC" what other issues did you work out?

          1 Reply Last reply Reply Quote 0
          • J
            jfinnigan
            last edited by

            you know one other thing I didn't think about with TINC is the firewall may need to be opened on wan for port 655.  all the other (Ipsec and OpenVPN) automatically do that, without creating rules but since tinc is not an official package it may not.. just a though. I'll check it again.

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              "the firewall may need to be opened on wan for port 655"

              haha…  I said that early on, but maybe it was lost in the clutter and frustration.

              It happens.

              1 Reply Last reply Reply Quote 0
              • J
                jfinnigan
                last edited by

                I feel really dumb now.. The firewall rules was the only Issue with it not connecting. I'm going to play with the multiple subnets this weekend but it's looking promising. Seems to have much less over head than IPsec does too

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  To error is human…  And a little funny when its someone else erroring :D

                  I feel your pain.  I've been there.

                  For what its worth, you sound wicked smart and fast learner.

                  1 Reply Last reply Reply Quote 0
                  • J
                    jfinnigan
                    last edited by

                    FYI, this is working great It's been in production for a while now. Great throughput even over TINC VPN

                    now the only thing I wish I could figure out is how to get Pfsense to do local dns lookup for dhcp client that don't specify a domain, just a hostname.

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      Services > DNS forwarder

                      Options there don't get you what you want?

                      1 Reply Last reply Reply Quote 0
                      • J
                        jfinnigan
                        last edited by

                        It works if I do an NSlookup/ping for Computer.localdomain but just computer does not work. if I do the nslookup or ping from pfsense itself it works with just the computer hostname.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          I wonder if a ubuntu machine with Samba 4.0 set up as a  WINs server would help?

                          1 Reply Last reply Reply Quote 0
                          • J
                            jfinnigan
                            last edited by

                            Oh yeah I fogort how DNS works there :)

                            I wonder if there is a pre-made WINS Server VM for ESXI lol.

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              Probably - But its stupid easy to make your own and you have demonstrated the ability.  I think it would be a piece of cake for you.  Just set it up to act as your DC.

                              1 Reply Last reply Reply Quote 0
                              • J
                                jfinnigan
                                last edited by

                                I only needed DNS to work from Staff Vlans -> Public and not vice versa. Our staff vlan doesn't use pfsense for DHCP/DNS it uses our domain controllers

                                So what I did was.
                                Make each pfsense box a different domain so they would be appended different dns suffixes to the hostnames
                                On the DNS Server on the domain controllers  I setup conditional forwarders for Pfsense domain
                                and In Group Policy Set DNS Suffix Search List to a comma seperated list with our Windows Domain being first and the pfsense domains after.

                                1 Reply Last reply Reply Quote 0
                                • K
                                  kejianshi
                                  last edited by

                                  That sounds fun…  Did it work?

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    jfinnigan
                                    last edited by

                                    It's working great so far. Sadly, if I intergted to sync between DNS Server/Active Directory it fails, but if I put it manually on each of them it works fine.

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      thetallkid
                                      last edited by

                                      jfinnigan, I have a few setup related questions about tinc.

                                      Under VPN –> Tinc --> Hosts
                                      Should the public key be the same as the one used in the Config section?

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jfinnigan
                                        last edited by

                                        The ones under Hosts should be the public key from the other Hosts you are connecting too, not the same as the public key you configured on that box. (for security all hosts should use different public/private keys)

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.