[SOLVED]Tunnel up but no connections between client LAN to server LAN
-
Hi, so I'm trying to setup an site to site vpn using peer to peer shared key. my setup looks like this
Server:
WAN: pppoe static
LAN:192.168.1.0/24
tunnel network: 10.10.10.0/24Client
WAN: DHCP from ISP modem with this subnet 192.168.10.0/24
LAN: 172.16.0.0/24and so the tunnel is up but i cant ping the client pfsense box within the 192.168.1.0/24 network and so as within 172.16.0.0/24 network cant ping
192.168.1.1 ip, but from server, i can ping the tunnel ip of client pfsense which is 10.10.10.2. I already added rules in WAN and OpenVPN to both pfsense boxes to accept traffic on port 1194 "source=any dest.=any port=1194" i got this erron on openvpn log from the server pfsenseERROR: FreeBSD route add command failed: external program exited with error status: 1
:( Im still noob on Networking, any help would be much appreciated. thanks in advance.
-
And are these devices in your different networks running firewalls? Tell you out of the box the windows firewall is not going to answer a ping from an IP that is not from its local network..
A test to see if the tunnel is up is ping the IP addresses of the other sides lan interface in pfsense.
Pinging or talking device to device that are on the lans of your different sites, you have to take into account any firewall software running on these devices and their rules as well.
-
Hi, thank you for the reply. Ive disabled all firewall software of client hosts, i can ping 10.10.10.2 tunnel ip from pfsense openvpn server which is the client pfsenses ip but i cant ping 10.10.10.1 from client box . 10.10.10.1 is the vpn servers tunnel ip
-
no one can help me with this? :'(
-
https://doc.pfsense.org/index.php/Why_can%27t_I_ping_some_OpenVPN_adapter_addresses
Ping something on the LAN, not the tunnel address.
-
I cant ping any adress on LAN on both sides. When i looked at the servers firewall logs, i see this :
action Time interface source dest proto X Dec 10 18:40:40 ovpns1 10.0.1.2 192.168.1.3 ICMP
-
Check your OpenVPN Firewall rules. Most people set to pass any any any to start then tighten when they know the VPN is working.
-
I already added a rule in openvpn tab after creating the server to accept traffic from any to any on both sides
-
Maybe you did it wrong because if it was right the traffic would be passing there.
How about you post what you have done instead of just saying what you think you have done.
There is nothing in your OP talking about 10.0.1.2 or 10.0.1.0/24. Where is that source IP address coming from?
-
Sorry for misleading you. From my OP, I indicated there tat my tunnel network is 10.10.10.0/24, it is now 10.0.1.0/24 please see my screensots
-
You can't have 192.168.1.0/24 as remote networks on both sides.
-
so im going to remove 192.168.1.0/24 from client remote network field? i sorry for this idiotic question, i dont know what to do. :'( i followed all the steps in the tutorial but i cant get it to work.
-
No you are trying to VPN two networks, both 192.168.1.0/24. That can't work. Well, at least without herculean NAT efforts.
-
Can you suggest something that i should do or change? I dont understand when you said "you are trying to VPN two networks, both 192.168.1.0/24" the server network is the only 192.168.1.0/24 network on the client pfsense is 172.16.0.0/24 thats behind a 192.168.10.0/24 ISP router.
-
Only going by what you posted.
The remote networks on both client and server are shown as 192.168.1.0/24.
The remote networks on the server should be 172.16.0.0/24
On the client 192.168.1.0/24
-
Thank you good Sir. I'll give it a try tomorrow.
-
Thank you very much Mr. Derelict. My VPN is working now :)