Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site-to-Site, client problems

    Scheduled Pinned Locked Moved OpenVPN
    11 Posts 2 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      RickTosch
      last edited by

      Hi,

      I've almost-successfully established OpenVPN site-to-site tunnel between 2 Sites. Both sites run pfSense 2.3.2.
      The problem is, computers at Site2 (client) are not able to communicate with computers at Site1 (server). Cannot even ping the Site1 router from computers at Site2.
      However, it is perfectly fine the other way around.

      I've pretty much followed this https://doc.pfsense.org/index.php/OpenVPN_Site_To_Site to a tea. The settings are identical.

      Site1: 172.16.0.0/24
      Site2: 172.16.1.0/24

      What am i missing:?)

      Thanks,

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        Is the client pfSense set as default gateway at the LAN hosts in 172.16.1.0/24?

        1 Reply Last reply Reply Quote 0
        • R
          RickTosch
          last edited by

          Hiya,

          Yes, I've checked a few computers and they all have 172.16.1.1 (which is my client pfSense) as their default gateway.
          Do I need to create a custom NAT rule?

          Thanks,

          1 Reply Last reply Reply Quote 0
          • V
            viragomann
            last edited by

            No, if pfSense is the default gateway there is no need for nat. You only need firewall rules at the clients LAN interface and the servers OpenVPN interface which allow the access.

            Do you have more than one OpenVPN instance running on one node?

            Check the routing table when the VPN is connected.

            1 Reply Last reply Reply Quote 0
            • R
              RickTosch
              last edited by

              Got the 2 firewall rules (one for the port, the other to allow all traffic inside OpenVPN tunnel) in place on both ends, pretty much identical.
              Only one instace of OpenVPN on each site. It is a fresh install really.

              tables:

              IPv4 Routes - Site1 - OpenVPN Server Server
              Destination	Gateway	Flags	Use	Mtu	Netif	Expire
              default	192.168.1.253	UGS	16324185	1500	em0	
              10.0.5.1	link#7	UHS	0	16384	lo0	
              10.0.5.2	link#7	UH	3	1500	ovpns1	
              127.0.0.1	link#6	UH	1350	16384	lo0	
              172.16.0.0/24	link#2	U	30884728	1500	em1	
              172.16.0.1	link#2	UHS	0	16384	lo0	
              172.16.1.0/24	10.0.5.2	UGS	16275112	1500	ovpns1	
              192.168.1.0/24	link#1	U	397949	1500	em0	
              192.168.1.250	link#1	UHS	0	16384	lo
              
              IPv4 Routes - Site2 - OpenVPN Client
              Destination	Gateway	Flags	Use	Mtu	Netif	Expire
              default	192.168.1.254	UGS	6005809	1500	em0	
              10.0.5.1	link#7	UH	3	1500	ovpnc1	
              10.0.5.2	link#7	UHS	0	16384	lo0	
              127.0.0.1	link#6	UH	1419	16384	lo0	
              172.16.0.0/24	10.0.5.1	UGS	312134	1500	ovpnc1	
              172.16.1.0/24	link#2	U	2947270	1500	em1	
              172.16.1.1	link#2	UHS	0	16384	lo0	
              192.168.1.0/24	link#1	U	94309	1500	em0	
              192.168.1.249	link#1	UHS	0	16384	lo0
              

              It seems like it's goood. Not sure what to make of it.
              By the way, the 192.168.1 subnet is because my pfSense WAN is connected to ISP modem/router which has its own NAT. Not sure if thats a problem.

              Many thanks for your help

              1 Reply Last reply Reply Quote 0
              • V
                viragomann
                last edited by

                The routes seem to be okay.

                Are you sure that the access isn't blocked by the destination hosts SW firewall?
                To ensure you can use packet capture (Diagnostic menu) at the servers OpenVPN and LAN interface to check if packets arrive there while pinging a host.

                1 Reply Last reply Reply Quote 0
                • R
                  RickTosch
                  last edited by

                  Thank you,
                  I will try the Packet Capture feature on the Server end right now
                  I do not believe it is a SW firewall because I tried going to Diagnostics -> Ping on the Client site to ping the Server site (172.16.0.1) and remote Vtunnel IP (10.0.5.1) and both timed out.
                  And again, it  pings fine the other way around.

                  1 Reply Last reply Reply Quote 0
                  • R
                    RickTosch
                    last edited by

                    Did Packet capture on the Server pfsense for the OpenVPN traffic:

                    11:17:27.845384 IP 10.0.5.2 > 172.16.0.1: ICMP echo request, id 6828, seq 0, length 64
                    11:17:28.855230 IP 10.0.5.2 > 172.16.0.1: ICMP echo request, id 6828, seq 1, length 64
                    11:17:29.857406 IP 10.0.5.2 > 172.16.0.1: ICMP echo request, id 6828, seq 2, length 64
                    
                    

                    That means the ping actually did make it but wasn't replied.

                    I also saw this in the Status-System Logs-Firewall-Dynamic View

                     	Sep 2 11:31:18 	ovpns1 	10.0.5.2 	172.16.0.1 	ICMP
                    	Sep 2 11:31:19 	ovpns1 	10.0.5.2 	172.16.0.1 	ICMP
                    	Sep 2 11:31:20 	ovpns1 	10.0.5.2 	172.16.0.1 	ICMP
                    

                    Does that mean the firewall is blocking it?

                    1 Reply Last reply Reply Quote 0
                    • V
                      viragomann
                      last edited by

                      So also the ping to the servers LAN address isn't replied. That couldn't be caused by a hosts FW, off course.
                      So it seems the packets are dropped. FW at the server rules surely okay?

                      1 Reply Last reply Reply Quote 0
                      • R
                        RickTosch
                        last edited by

                        yes,  I just double checked and believe the FW are fine:

                        These are my Firewall Rules: (like I said, its a fresh):  :)

                        WAN:

                        States 	Protocol 	Source 	Port 	Destination 	Port 	Gateway 	Queue 	Schedule 	Description
                        0/1 KiB
                        	* 	RFC 1918 networks 	* 	* 	* 	* 	* 		Block private networks
                        0/0 B
                        	* 	Reserved
                        Not assigned by IANA 	* 	* 	* 	* 	* 		Block bogon networks
                        0/3.03 GiB
                        	IPv4 UDP 	* 	* 	WAN address 	1194 	* 	none 	  	
                        

                        OpenVPN Rules

                         		States 	Protocol 	Source 	Port 	Destination 	Port 	Gateway 	Queue 	Schedule 	Description 	Actions
                        		0/0 B
                        	        IPv4 * 	* 	* 	* 	* 	* 	none 	  	
                        

                        Both rules are identical on both the server and the client.

                        1 Reply Last reply Reply Quote 0
                        • R
                          RickTosch
                          last edited by

                          OK … this one of those cases where reboot works.
                          Rebooted the Server pfSense and all is well now.

                          Thanks a bunch for your time and help!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.