Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pulling my hair out! Vpn server + client same time…

    Scheduled Pinned Locked Moved OpenVPN
    12 Posts 2 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      amendolaro
      last edited by

      @viragomann:

      You didn't post your client setting. However, I presume, the vpn server your client is connected to is set as default gateway on pfSense. So if it connected any packets are routed to the vpn server, including responses to vpn requests.

      To solve, check "Don't pull routes" in the client setting and add the vpn gateway to the firewall rules if you want to direct any traffic to the vpn server:
      https://doc.pfsense.org/index.php/What_is_policy_routing

      Sorry here is client

      Please let me know what the issue is for sure :( thanks for all your help

      https://i.imgsafe.org/78d6ec3b3b.png

      https://i.imgsafe.org/78d6f61898.png

      https://i.imgsafe.org/78d7108c50.png

      https://i.imgsafe.org/78d7240365.png

      https://i.imgsafe.org/78d74e9b84.png

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        I meant the client running on pfSense. Does it pull routes? Or is the default route on pfSense pointing to the vpn server?
        Check it in Diagnostic > Routes and post the page please.

        1 Reply Last reply Reply Quote 0
        • A
          amendolaro
          last edited by

          @viragomann:

          I meant the client running on pfSense. Does it pull routes? Or is the default route on pfSense pointing to the vpn server?
          Check it in Diagnostic > Routes and post the page please.

          https://i.imgsafe.org/79a1095c61.png

          https://i.imgsafe.org/79a10dea56.png

          https://i.imgsafe.org/79a1359f4f.png

          1 Reply Last reply Reply Quote 0
          • V
            viragomann
            last edited by

            @viragomann:

            Check it in Diagnostic > Routes and post the page please.

            Please, post the full screen, it must also show the interface column (netif). The client must be connected at this time, otherwise the route wont be set.

            Or just try out to check "Don't pull routes" in client config and test if you are able to connect to the server.

            1 Reply Last reply Reply Quote 0
            • A
              amendolaro
              last edited by

              @viragomann:

              @viragomann:

              Check it in Diagnostic > Routes and post the page please.

              Please, post the full screen, it must also show the interface column (netif). The client must be connected at this time, otherwise the route wont be set.

              Or just try out to check "Don't pull routes" in client config and test if you are able to connect to the server.

              You are amazing! Thank you ! Now only issue, which isn't a huge one, is its showing my isp ip instead of vpn ip. Any quick fix for this ?

              1 Reply Last reply Reply Quote 0
              • V
                viragomann
                last edited by

                As mentioned above: Policy routing does the magic.

                Any outgoing traffic in pfSense must be permitted by firewall rules. In each rule you can specify a gateway. For using the openvpn connection, you have to set it to the vpn client gateway.

                If you haven't add any rules up to now or changed your rule set, you will have an any to any rule, which allow outgoing traffic. Edit this rule go down and display the advanced options, go down to "Gateway" and select the vpn client GW and save the rule.
                So traffic is directed to the vpn server, the client is connected to. This doesn't affect connections to your vpn server, cause this is an incoming traffic.

                1 Reply Last reply Reply Quote 0
                • A
                  amendolaro
                  last edited by

                  @viragomann:

                  As mentioned above: Policy routing does the magic.

                  Any outgoing traffic in pfSense must be permitted by firewall rules. In each rule you can specify a gateway. For using the openvpn connection, you have to set it to the vpn client gateway.

                  If you haven't add any rules up to now or changed your rule set, you will have an any to any rule, which allow outgoing traffic. Edit this rule go down and display the advanced options, go down to "Gateway" and select the vpn client GW and save the rule.
                  So traffic is directed to the vpn server, the client is connected to. This doesn't affect connections to your vpn server, cause this is an incoming traffic.

                  I went to my openvpn tab, and edit the rule that the openvpn wizard made and change gateway to vpn but still showing isp. Am I editing the wrong rule? What interface should I be editing?

                  1 Reply Last reply Reply Quote 0
                  • V
                    viragomann
                    last edited by

                    No no no!
                    The rule is on the interface where the traffic comes in! pfSene basics.

                    So your client PC will be connected to the LAN interface, cause this is the only on which has a default any to any rule. So you have to go to LAN tab and edit this rule.

                    1 Reply Last reply Reply Quote 0
                    • A
                      amendolaro
                      last edited by

                      @viragomann:

                      No no no!
                      The rule is on the interface where the traffic comes in! pfSene basics.

                      So your client PC will be connected to the LAN interface, cause this is the only on which has a default any to any rule. So you have to go to LAN tab and edit this rule.

                      Well if I pull up the lab interface tab , the rule there is already any to any with the vpn as gateway

                      https://i.imgsafe.org/6f04f8b398.png

                      1 Reply Last reply Reply Quote 0
                      • V
                        viragomann
                        last edited by

                        "VPN" is your vpn clients gateway?
                        If so it should work, when the client is connected.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.