Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to site on two pfsense

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 6 Posters 6.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      Nachtfalke
      last edited by

      Hi,

      On OpenVPN Server site you need to do the following:

      On firewall OpenVPN tab allow traffic from remote LAN (192.168.1.0/24)
      On pfsense LAN firewall you need to allow traffic to the remote network. Leave the gateway on "default" in this firewall rule.

      On OpenVPN client site you need to do:

      On firewall OpenVPN tab allow traffic from remote LAN (192.168.200.0/23)
      On pfsense LAN firewall you need to allow traffic to the remote network. Leave the gateway on "default" in this firewall rule.

      So it is probably a firewall rule problem somewhere.

      1 Reply Last reply Reply Quote 0
      • 2
        28red
        last edited by

        Hi all
        Im sitting with the exact same problem and would just like to find out if the problem was fixed with help above and if so please share some details.

        Thanks

        1 Reply Last reply Reply Quote 0
        • M
          marvosa
          last edited by

          Please post server1.conf and client1.conf.

          How are you trying to access your files?

          1 Reply Last reply Reply Quote 0
          • L
            leyley
            last edited by

            @marvosa:

            Please post server1.conf and client1.conf.

            How are you trying to access your files?

            Hi marvosa

            I had print screen the conf for both.

            From client site, just enter server site of File Server IP. I cannot ping the server tunnel IP as well.

            1 Reply Last reply Reply Quote 0
            • M
              marvosa
              last edited by

              I had print screen the conf for both.

              I'm not sure what that means, but the files you need are located here:

              /var/etc/openvpn/

              You can use putty and log into to the shell or go to Diagnostics -> Edit File and post the contents of server1.conf from the server and client1.conf from the client.

              1 Reply Last reply Reply Quote 0
              • 2
                28red
                last edited by

                Hi

                Sorry for the long wait. Okay so my openvpn tunnel is up and i basically opened up everything that made sense to me for a local lan connection over the tunnel. I can ping both tunnel addresses(from server and client) and the local ip of each pfsense box. Each setup is connected to a windows laptop. My goal now would be to ping from the client side: windows laptop -> pfsense client -> vpn tunnel > pfsense server -> windows laptop (test purposes only, this will be replaced by a linux pc )

                As soon as I can get it to ping I would like to get a second and third  pfsense client(all in remote locations), each with their own local subnet to get access to the pfsense server local subnet.

                My last step would be to add road warriors as well for about 3 clients that will run the Openvpn client software on their devices(Windows).

                Here are my log files for my first server and client. For testing purposes my server is connected to my nat router and client to a mobile 3g router to simulate a remote connection

                Server Config:

                dev ovpns1
                dev-type tun
                tun-ipv6
                dev-node /dev/tun1
                writepid /var/run/openvpn_server1.pid
                #user nobody
                #group nobody
                script-security 3
                daemon
                keepalive 10 60
                ping-timer-rem
                persist-tun
                persist-key
                proto udp
                cipher AES-256-CBC
                up /usr/local/sbin/ovpn-linkup
                down /usr/local/sbin/ovpn-linkdown
                local 192.168.2.15
                ifconfig 10.0.9.1 10.0.9.2
                lport 1194
                management /var/etc/openvpn/server1.sock unix
                push "route 192.168.1.0 255.255.255.0"
                route 192.168.10.0 255.255.255.0
                secret /var/etc/openvpn/server1.secret

                Client Config:

                dev ovpnc1
                dev-type tun
                tun-ipv6
                dev-node /dev/tun1
                writepid /var/run/openvpn_client1.pid
                #user nobody
                #group nobody
                script-security 3
                daemon
                keepalive 10 60
                ping-timer-rem
                persist-tun
                persist-key
                proto udp
                cipher AES-256-CBC
                up /usr/local/sbin/ovpn-linkup
                down /usr/local/sbin/ovpn-linkdown
                local 192.168.2.100
                lport 0
                management /var/etc/openvpn/client1.sock unix
                remote dyndns address 1194
                ifconfig 10.0.9.2 10.0.9.1
                route 192.168.1.0 255.255.255.0
                secret /var/etc/openvpn/client1.secret

                Regards and thanks for the reply thus far.

                1 Reply Last reply Reply Quote 0
                • B
                  bdab
                  last edited by

                  Try manually adding outbound NAT rules that force every packet departing from the LAN (either at Main site or at Branch site) to be NATed to the interface address.

                  Also try to diagnose routing via Diagnostics->Routes, checking that the OpenVPN settings do add routes to remote networks as configured.

                  Finally, try packet captures at different interfaces (ovpns1 & ovpnc1) to see how packets get routed.

                  1 Reply Last reply Reply Quote 0
                  • C
                    cubert
                    last edited by

                    I to am having issues with site to site.

                    I am able to successfully bring up tunnel, I can ping the LAN IP address from pfsense box 1 to pfsense box 2 and see traffic come across opvns1 interface in both directions.

                    but when a workstation pings  either the LAN IP of the remote pfsense or any other remote IP on subnet it fails and I see no traffic cross the opvns1 interface. I have opened up FW rules to (* * * * *) on LAN and OPENVPN tabs so all traffic should flow unhindered.

                    So I gather that tunnel is up and available but something in routing has gone sour.  Below are the routes I have for the tunnel.

                    Anyone else have out of the box issues that resemble this issue?

                    My site to site uses ovpns2 interface on box1 and ovpnc1 interface on box2

                    LAN subnets are 192.168.23.0/24 and 192.168.25.0/24
                    VPN link subnet is 192.168.16.0/24

                    route.JPG
                    route.JPG_thumb
                    route2.JPG
                    route2.JPG_thumb

                    Cube Dweller
                    www.squidworks.net

                    "Give a man a fish and feed him for a day, Teach a man to fish and loose a steady customer."

                    1 Reply Last reply Reply Quote 0
                    • B
                      bdab
                      last edited by

                      I don't see any flaws in the routing tables (I assume you left out the default route definition though). Have you tried using manually defined outbound NAT?

                      1 Reply Last reply Reply Quote 0
                      • M
                        marvosa
                        last edited by

                        Sorry for the delay, I was on vacation.

                        leyley - Are you going to post your configs or did you resolve your issue?  I can see a few things right off the bat:

                        • On the server-side, your local and remote networks are the same

                        • On the client-side, the remote network overlaps the tunnel network, which leads into #3

                        • Your client config suggests that your server-side LAN is 192.168.200.0/23, which conflicts with your tunnel network, so you will need to adjust your tunnel network accordingly.

                        28red - Did you get your issue resolved?

                        cubert - Still having issues?  Post your server1.conf and client1.conf.  Disable the software firewall on your clients.  Make sure PFsense is the default gateway on your clients.  Also, I see 192.168.23.0/24 is on a bridged interface (bridge0) … explain what you're doing there.

                        1 Reply Last reply Reply Quote 0
                        • C
                          cubert
                          last edited by

                          We have 2 PFSense w/wifi adaptors that we bridge the "Lan" and WIFI interfaces together as a single interface for internal traffic.

                          We had a IPSEC VPN up between the to systems that was running fine but needed to test out setting up a open VPN for a client so we started testing on our selves. We disabled the IPSec tunnels and brought up the OpenVPN tunnel.

                          Client.config
                          –---------------------------------------------------------
                          dev ovpnc1
                          dev-type tun
                          dev-node /dev/tun1
                          writepid /var/run/openvpn_client1.pid
                          #user nobody
                          #group nobody
                          script-security 3
                          daemon
                          keepalive 10 60
                          ping-timer-rem
                          persist-tun
                          persist-key
                          proto tcp-client
                          cipher AES-128-CBC
                          up /usr/local/sbin/ovpn-linkup
                          down /usr/local/sbin/ovpn-linkdown
                          local 173.166.143.121
                          lport 0
                          management /var/etc/openvpn/client1.sock unix
                          remote 71.43.130.170 1195
                          ifconfig 192.168.16.2 192.168.16.1
                          route 192.168.23.0 255.255.255.0
                          secret /var/etc/openvpn/client1.secret

                          Server.conf

                          dev ovpns2
                          dev-type tun
                          dev-node /dev/tun2
                          writepid /var/run/openvpn_server2.pid
                          #user nobody
                          #group nobody
                          script-security 3
                          daemon
                          keepalive 10 60
                          ping-timer-rem
                          persist-tun
                          persist-key
                          proto tcp-server
                          cipher AES-128-CBC
                          up /usr/local/sbin/ovpn-linkup
                          down /usr/local/sbin/ovpn-linkdown
                          local 71.43.130.170
                          ifconfig 192.168.16.1 192.168.16.2
                          lport 1195
                          management /var/etc/openvpn/server2.sock unix
                          max-clients 10
                          push "route 192.168.23.0 255.255.255.0"
                          route 192.168.25.0 255.255.255.0
                          secret /var/etc/openvpn/server2.secret

                          I can ping from pfsenseA to pfsenseB (and reverse) through openVPN using these addresses ->192.168.16.1 192.168.16.2 and I can ping LAN/Bridge address from the other side on both systems. I just does not seem to route the Subnet addresses.

                          All LAN/Bridge and Openvpn firewall tabs are ***** across the board passing everything. Both systems are on the Internet with a static WAN IP address and are routing all traffic for the local subnets.

                          Cube Dweller
                          www.squidworks.net

                          "Give a man a fish and feed him for a day, Teach a man to fish and loose a steady customer."

                          1 Reply Last reply Reply Quote 0
                          • M
                            marvosa
                            last edited by

                            Configs look solid, nothing stands out, so it comes down to looking at logs and troubleshooting.  A few things I would try:

                            • what PFsense versions are both sides on?

                            • I've read many posts that have stated rebooting both sides have solved weird routing issues… might be worth a shot if you haven't tried it already

                            • Turn on logging on the openvpn, lan and bridge interface to see if you can catch something in the logs

                            • check Status -> System Log -> OpenVPN are there any errors in there?  Also check the IPsec tab and make sure some of that old IPsec tunnel isn't hanging around

                            • I'm sure you've done this, but we'll put it out there anyway… once you turn on logging in your firewall rules, disable the windows firewall on both sides and start generating traffic... e.g. telnet to known open ports, RDP to something, etc... you may catch something in the logs (check both sides)

                            • verify PFsense is the default gateway on your clients

                            • Re-verify you have any/any rules on all your interfaces on both sides

                            • I've also read posts where old IPsec settings were the culprit to routing issues, so backup your config, then delete all your IPsec info (both sides), then reset the states on both sides… you may have some old states from your IPsec tunnel

                            • Just for Sh*ts and Giggles…. switch to UDP then try again

                            • Just to rule out that bridge…. un-bridge that interface on the server-side, reset your states and try generating traffic again

                            • Unfortunately, I've also read this has worked for others…. but as a last resort, blow away both sides and rebuild fresh on v2.1.... for whatever reason that has miraculously fixed issues also

                            1 Reply Last reply Reply Quote 0
                            • C
                              cubert
                              last edited by

                              Well… (feeling kinda stupid) :P

                              I got as far as step 2 and it started working like expected. I haven't had to reboot PFSense devices in ages and didn't occur to me. In my defense, they were also in production use so was not convenient at the time.

                              Problem solved IPSec had something left over after disabling tunnels that a reboot resolved.

                              Thanks Marvosa...

                              Cube Dweller
                              www.squidworks.net

                              "Give a man a fish and feed him for a day, Teach a man to fish and loose a steady customer."

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.