Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to site on two pfsense

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 6 Posters 6.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 2
      28red
      last edited by

      Hi all
      Im sitting with the exact same problem and would just like to find out if the problem was fixed with help above and if so please share some details.

      Thanks

      1 Reply Last reply Reply Quote 0
      • M
        marvosa
        last edited by

        Please post server1.conf and client1.conf.

        How are you trying to access your files?

        1 Reply Last reply Reply Quote 0
        • L
          leyley
          last edited by

          @marvosa:

          Please post server1.conf and client1.conf.

          How are you trying to access your files?

          Hi marvosa

          I had print screen the conf for both.

          From client site, just enter server site of File Server IP. I cannot ping the server tunnel IP as well.

          1 Reply Last reply Reply Quote 0
          • M
            marvosa
            last edited by

            I had print screen the conf for both.

            I'm not sure what that means, but the files you need are located here:

            /var/etc/openvpn/

            You can use putty and log into to the shell or go to Diagnostics -> Edit File and post the contents of server1.conf from the server and client1.conf from the client.

            1 Reply Last reply Reply Quote 0
            • 2
              28red
              last edited by

              Hi

              Sorry for the long wait. Okay so my openvpn tunnel is up and i basically opened up everything that made sense to me for a local lan connection over the tunnel. I can ping both tunnel addresses(from server and client) and the local ip of each pfsense box. Each setup is connected to a windows laptop. My goal now would be to ping from the client side: windows laptop -> pfsense client -> vpn tunnel > pfsense server -> windows laptop (test purposes only, this will be replaced by a linux pc )

              As soon as I can get it to ping I would like to get a second and third  pfsense client(all in remote locations), each with their own local subnet to get access to the pfsense server local subnet.

              My last step would be to add road warriors as well for about 3 clients that will run the Openvpn client software on their devices(Windows).

              Here are my log files for my first server and client. For testing purposes my server is connected to my nat router and client to a mobile 3g router to simulate a remote connection

              Server Config:

              dev ovpns1
              dev-type tun
              tun-ipv6
              dev-node /dev/tun1
              writepid /var/run/openvpn_server1.pid
              #user nobody
              #group nobody
              script-security 3
              daemon
              keepalive 10 60
              ping-timer-rem
              persist-tun
              persist-key
              proto udp
              cipher AES-256-CBC
              up /usr/local/sbin/ovpn-linkup
              down /usr/local/sbin/ovpn-linkdown
              local 192.168.2.15
              ifconfig 10.0.9.1 10.0.9.2
              lport 1194
              management /var/etc/openvpn/server1.sock unix
              push "route 192.168.1.0 255.255.255.0"
              route 192.168.10.0 255.255.255.0
              secret /var/etc/openvpn/server1.secret

              Client Config:

              dev ovpnc1
              dev-type tun
              tun-ipv6
              dev-node /dev/tun1
              writepid /var/run/openvpn_client1.pid
              #user nobody
              #group nobody
              script-security 3
              daemon
              keepalive 10 60
              ping-timer-rem
              persist-tun
              persist-key
              proto udp
              cipher AES-256-CBC
              up /usr/local/sbin/ovpn-linkup
              down /usr/local/sbin/ovpn-linkdown
              local 192.168.2.100
              lport 0
              management /var/etc/openvpn/client1.sock unix
              remote dyndns address 1194
              ifconfig 10.0.9.2 10.0.9.1
              route 192.168.1.0 255.255.255.0
              secret /var/etc/openvpn/client1.secret

              Regards and thanks for the reply thus far.

              1 Reply Last reply Reply Quote 0
              • B
                bdab
                last edited by

                Try manually adding outbound NAT rules that force every packet departing from the LAN (either at Main site or at Branch site) to be NATed to the interface address.

                Also try to diagnose routing via Diagnostics->Routes, checking that the OpenVPN settings do add routes to remote networks as configured.

                Finally, try packet captures at different interfaces (ovpns1 & ovpnc1) to see how packets get routed.

                1 Reply Last reply Reply Quote 0
                • C
                  cubert
                  last edited by

                  I to am having issues with site to site.

                  I am able to successfully bring up tunnel, I can ping the LAN IP address from pfsense box 1 to pfsense box 2 and see traffic come across opvns1 interface in both directions.

                  but when a workstation pings  either the LAN IP of the remote pfsense or any other remote IP on subnet it fails and I see no traffic cross the opvns1 interface. I have opened up FW rules to (* * * * *) on LAN and OPENVPN tabs so all traffic should flow unhindered.

                  So I gather that tunnel is up and available but something in routing has gone sour.  Below are the routes I have for the tunnel.

                  Anyone else have out of the box issues that resemble this issue?

                  My site to site uses ovpns2 interface on box1 and ovpnc1 interface on box2

                  LAN subnets are 192.168.23.0/24 and 192.168.25.0/24
                  VPN link subnet is 192.168.16.0/24

                  route.JPG
                  route.JPG_thumb
                  route2.JPG
                  route2.JPG_thumb

                  Cube Dweller
                  www.squidworks.net

                  "Give a man a fish and feed him for a day, Teach a man to fish and loose a steady customer."

                  1 Reply Last reply Reply Quote 0
                  • B
                    bdab
                    last edited by

                    I don't see any flaws in the routing tables (I assume you left out the default route definition though). Have you tried using manually defined outbound NAT?

                    1 Reply Last reply Reply Quote 0
                    • M
                      marvosa
                      last edited by

                      Sorry for the delay, I was on vacation.

                      leyley - Are you going to post your configs or did you resolve your issue?  I can see a few things right off the bat:

                      • On the server-side, your local and remote networks are the same

                      • On the client-side, the remote network overlaps the tunnel network, which leads into #3

                      • Your client config suggests that your server-side LAN is 192.168.200.0/23, which conflicts with your tunnel network, so you will need to adjust your tunnel network accordingly.

                      28red - Did you get your issue resolved?

                      cubert - Still having issues?  Post your server1.conf and client1.conf.  Disable the software firewall on your clients.  Make sure PFsense is the default gateway on your clients.  Also, I see 192.168.23.0/24 is on a bridged interface (bridge0) … explain what you're doing there.

                      1 Reply Last reply Reply Quote 0
                      • C
                        cubert
                        last edited by

                        We have 2 PFSense w/wifi adaptors that we bridge the "Lan" and WIFI interfaces together as a single interface for internal traffic.

                        We had a IPSEC VPN up between the to systems that was running fine but needed to test out setting up a open VPN for a client so we started testing on our selves. We disabled the IPSec tunnels and brought up the OpenVPN tunnel.

                        Client.config
                        –---------------------------------------------------------
                        dev ovpnc1
                        dev-type tun
                        dev-node /dev/tun1
                        writepid /var/run/openvpn_client1.pid
                        #user nobody
                        #group nobody
                        script-security 3
                        daemon
                        keepalive 10 60
                        ping-timer-rem
                        persist-tun
                        persist-key
                        proto tcp-client
                        cipher AES-128-CBC
                        up /usr/local/sbin/ovpn-linkup
                        down /usr/local/sbin/ovpn-linkdown
                        local 173.166.143.121
                        lport 0
                        management /var/etc/openvpn/client1.sock unix
                        remote 71.43.130.170 1195
                        ifconfig 192.168.16.2 192.168.16.1
                        route 192.168.23.0 255.255.255.0
                        secret /var/etc/openvpn/client1.secret

                        Server.conf

                        dev ovpns2
                        dev-type tun
                        dev-node /dev/tun2
                        writepid /var/run/openvpn_server2.pid
                        #user nobody
                        #group nobody
                        script-security 3
                        daemon
                        keepalive 10 60
                        ping-timer-rem
                        persist-tun
                        persist-key
                        proto tcp-server
                        cipher AES-128-CBC
                        up /usr/local/sbin/ovpn-linkup
                        down /usr/local/sbin/ovpn-linkdown
                        local 71.43.130.170
                        ifconfig 192.168.16.1 192.168.16.2
                        lport 1195
                        management /var/etc/openvpn/server2.sock unix
                        max-clients 10
                        push "route 192.168.23.0 255.255.255.0"
                        route 192.168.25.0 255.255.255.0
                        secret /var/etc/openvpn/server2.secret

                        I can ping from pfsenseA to pfsenseB (and reverse) through openVPN using these addresses ->192.168.16.1 192.168.16.2 and I can ping LAN/Bridge address from the other side on both systems. I just does not seem to route the Subnet addresses.

                        All LAN/Bridge and Openvpn firewall tabs are ***** across the board passing everything. Both systems are on the Internet with a static WAN IP address and are routing all traffic for the local subnets.

                        Cube Dweller
                        www.squidworks.net

                        "Give a man a fish and feed him for a day, Teach a man to fish and loose a steady customer."

                        1 Reply Last reply Reply Quote 0
                        • M
                          marvosa
                          last edited by

                          Configs look solid, nothing stands out, so it comes down to looking at logs and troubleshooting.  A few things I would try:

                          • what PFsense versions are both sides on?

                          • I've read many posts that have stated rebooting both sides have solved weird routing issues… might be worth a shot if you haven't tried it already

                          • Turn on logging on the openvpn, lan and bridge interface to see if you can catch something in the logs

                          • check Status -> System Log -> OpenVPN are there any errors in there?  Also check the IPsec tab and make sure some of that old IPsec tunnel isn't hanging around

                          • I'm sure you've done this, but we'll put it out there anyway… once you turn on logging in your firewall rules, disable the windows firewall on both sides and start generating traffic... e.g. telnet to known open ports, RDP to something, etc... you may catch something in the logs (check both sides)

                          • verify PFsense is the default gateway on your clients

                          • Re-verify you have any/any rules on all your interfaces on both sides

                          • I've also read posts where old IPsec settings were the culprit to routing issues, so backup your config, then delete all your IPsec info (both sides), then reset the states on both sides… you may have some old states from your IPsec tunnel

                          • Just for Sh*ts and Giggles…. switch to UDP then try again

                          • Just to rule out that bridge…. un-bridge that interface on the server-side, reset your states and try generating traffic again

                          • Unfortunately, I've also read this has worked for others…. but as a last resort, blow away both sides and rebuild fresh on v2.1.... for whatever reason that has miraculously fixed issues also

                          1 Reply Last reply Reply Quote 0
                          • C
                            cubert
                            last edited by

                            Well… (feeling kinda stupid) :P

                            I got as far as step 2 and it started working like expected. I haven't had to reboot PFSense devices in ages and didn't occur to me. In my defense, they were also in production use so was not convenient at the time.

                            Problem solved IPSec had something left over after disabling tunnels that a reboot resolved.

                            Thanks Marvosa...

                            Cube Dweller
                            www.squidworks.net

                            "Give a man a fish and feed him for a day, Teach a man to fish and loose a steady customer."

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.