Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to Site with DD-WRT (SOLVED)

    Scheduled Pinned Locked Moved OpenVPN
    29 Posts 5 Posters 6.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann
      last edited by

      You've set up a remote access server on pfSense, not a site-to-site.
      ??

      1 Reply Last reply Reply Quote 0
      • K
        killmasta93
        last edited by

        im pretty sure its a site to site as everything shows connected i just cant understand why pfSense cannot contact DDWRT if there both connected

        Tutorials:

        https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

        1 Reply Last reply Reply Quote 0
        • V
          viragomann
          last edited by

          Yeah, your upper screenshot of pfSense VPN server shows a remote access server, the lower one shows a site-to-site.

          Is the DDWRT the default gateway in its LAN?

          1 Reply Last reply Reply Quote 0
          • K
            killmasta93
            last edited by

            Thanks for the reply, yeah the upper one was a messed up, the second one is correct, when you say is the DDWRT the default gateway do you mean create a rule
            or the default gateway of which the it gets from the OpenVPN? which it gets a 192.168.90.6
            or the the gateway of the DDWRT which is 192.168.1.251

            Thank you

            Tutorials:

            https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

            1 Reply Last reply Reply Quote 0
            • V
              viragomann
              last edited by

              I asked if the DDWRT is the default gateway in the network behind (192.168.1.0/24).

              1 Reply Last reply Reply Quote 0
              • K
                killmasta93
                last edited by

                yes the DDWRT is the default gateway for the network 192.168.1.0/24

                Tutorials:

                https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                1 Reply Last reply Reply Quote 0
                • V
                  viragomann
                  last edited by

                  It seems that pfSense doesn't find the correct route to the network behind DDWRT.

                  Are you running multiple VPN instances on pfSense, both server and client?

                  Please post the IPv4 routing table from pfSense.

                  1 Reply Last reply Reply Quote 0
                  • K
                    killmasta93
                    last edited by

                    Thank you for the reply,
                    as I am also running other OpenVPN servers but there are only remote for clients

                    See picture for the routing

                    Thank you

                    Clipboarder.2017.03.22-013.png
                    Clipboarder.2017.03.22-012.png_thumb
                    Clipboarder.2017.03.22-012.png
                    Clipboarder.2017.03.22-010.png
                    Clipboarder.2017.03.22-010.png_thumb
                    Clipboarder.2017.03.22-011.png
                    Clipboarder.2017.03.22-011.png_thumb
                    Clipboarder.2017.03.22-013.png_thumb

                    Tutorials:

                    https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                    1 Reply Last reply Reply Quote 0
                    • V
                      viragomann
                      last edited by

                      As mentioned, it doesn't matter which kind of OpenVPN instances, if you run multiple and you haven't assigned separate interfaces to them all are handled as an unique interface group.

                      So for correct routing you have to assign an interface to the site-to-site server. Interface > assign
                      At available network ports select the site-to-site server and click Add, open the new interface and enable it, also enter a proper description and save it.

                      1 Reply Last reply Reply Quote 0
                      • K
                        killmasta93
                        last edited by

                        Thanks for the reply so something like this? Assuming on DDWRT when it shows connected to remote address it must be the gateway? Would i also delete the Rule on openVPN for

                        IPv4 * 192.168.90.0/24 * * * * none

                        Thank you see pictures

                        Clipboarder.2017.03.22-016.png
                        Clipboarder.2017.03.22-016.png_thumb
                        Clipboarder.2017.03.22-017.png
                        Clipboarder.2017.03.22-017.png_thumb
                        Clipboarder.2017.03.22-018.png
                        Clipboarder.2017.03.22-018.png_thumb
                        Clipboarder.2017.03.22-019.png
                        Clipboarder.2017.03.22-019.png_thumb

                        Tutorials:

                        https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                        1 Reply Last reply Reply Quote 0
                        • V
                          viragomann
                          last edited by

                          Yes, but don't set an IP address on the interface, just enable it. IP has to be set to "None"!

                          1 Reply Last reply Reply Quote 0
                          • K
                            killmasta93
                            last edited by

                            Thanks for the reply So configured to none but still nothing :(

                            Thank you

                            Clipboarder.2017.03.22-020.png
                            Clipboarder.2017.03.22-020.png_thumb

                            Tutorials:

                            https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                            1 Reply Last reply Reply Quote 0
                            • V
                              viragomann
                              last edited by

                              Have you tried to reboot pfSense?

                              If it still doesn't work after reboot make a packet capture on the SitetoSite interface and select ICMP protocol while you try a ping to the DDWRT. Maybe there is something wrong with the NAT.
                              Post the capture output, please.

                              1 Reply Last reply Reply Quote 0
                              • K
                                killmasta93
                                last edited by

                                Thanks for the reply

                                here is the packet capture

                                from the packet capture only showed these lines

                                20:12:56.238295 IP 192.168.90.1 > 192.168.1.251: ICMP echo request, id 4676, seq 0, length 64
                                20:12:57.253548 IP 192.168.90.1 > 192.168.1.251: ICMP echo request, id 4676, seq 1, length 64
                                20:12:58.256451 IP 192.168.90.1 > 192.168.1.251: ICMP echo request, id 4676, seq 2, length 64
                                
                                

                                packet capture

                                http://www.filedropper.com/openvpn

                                Thank you again

                                Tutorials:

                                https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                                1 Reply Last reply Reply Quote 0
                                • V
                                  viragomann
                                  last edited by

                                  So you get no responses from DDWRT, though the pings come from the VPN server which is connected directly to the DDWRTs interface.
                                  I think DDWRT blocks the access. Check its firewall rules.

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    This is not a DDWRT forum.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      killmasta93
                                      last edited by

                                      Thanks for the reply,

                                      @derelict, your correct but as i posted on the DDWRT forums i got yelled at saying its a server issue with pfSense

                                      @viragomann
                                      so this means that the routing is correct on the server side? just want to make sure before i start messing with Iptables on DDWRT

                                      Thank you

                                      Tutorials:

                                      https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                                      1 Reply Last reply Reply Quote 0
                                      • V
                                        viragomann
                                        last edited by

                                        The routes look well, 192.168.1.0/24 points to the vpn client. So this subnet is routed over the vpn as the packet capture on vpn server interface shows. You should see the exactly same packets on the clients vpn interface.

                                        1 Reply Last reply Reply Quote 0
                                        • K
                                          killmasta93
                                          last edited by

                                          Thanks for the reply, as i was investigating on DDWRT as they told me it this also i even turn off the firewall of DDWRT so i think it might be something with the routes

                                          you have to add a static route for the OpenVPN client's local IP network to the OpenVPN server config, and use iroute to inform the OpenVPN server that that static route is associated w/ that OpenVPN client. You must address this issue before devices on the OpenVPN server side can initiate connections to devices on the OpenVPN client side.

                                          Tutorials:

                                          https://www.mediafire.com/folder/v329emaz1e9ih/Tutorials

                                          1 Reply Last reply Reply Quote 0
                                          • P
                                            piperspace
                                            last edited by

                                            I have a working set up which I believe is similar to yours. I am in the process of upgrading from dd-wrt to pfsense with site-to-site OpenVPN.

                                            On the server end I have pfsense running OpenVPN server on subnet 10.0.1.1/24. On the client I have dd-wrt running OpenVPN client on 192.168.122.1/24.

                                            In order to route useful traffic over my VPN it was necessary to add the following directive to pfsense => OpenVPN => Server => Advanced Configuration => Custom options

                                            push "route 10.0.1.0 255.255.255.0"

                                            Also, in pfsense => OpenVPN => Client Specific Overrides => I created an entry with the Common Name (CN) of the client. In that entry Client Settings => Advanced has:

                                            iroute 192.168.122.0 255.255.255.0

                                            The first directive allows stations on the client lan to see assets on the server's lan. The second directive allows stations on the server lan to see assets on the client lan.

                                            Hope this helps.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.