Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Net30 Topology: No incoming traffic

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 2 Posters 2.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V Offline
      viragomann
      last edited by

      Have you set outbound NAT rules for the VPN clients interface or did pfSense set them automatically?
      Please post a screenshot if you're not sure.

      1 Reply Last reply Reply Quote 0
      • N Offline
        nexodev
        last edited by

        No, there are no VPN related NAT outbound rules. (Automatic outbound NAT rule generation)
        There are only two WAN autogenerated rules, with source 127.0.0.0/8.

        Are there outbound NAT rules required? At the moment, the pfSense machine is not yet used as a router, an I try to access the remote network from the pfSense machine directly.

        1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann
          last edited by

          Have you even assigned an interface to the vpn client?

          1 Reply Last reply Reply Quote 0
          • N Offline
            nexodev
            last edited by

            yes

            edit: there are two interfaces, WAN and LAN.
            The pfsense machine lies in a microsoft azure network.
            The WAN interface is connected to the cloud network and the LAN interface is assigned to the OpenVPN client.

            1 Reply Last reply Reply Quote 0
            • V Offline
              viragomann
              last edited by

              @nexodev:

              the LAN interface is assigned to the OpenVPN client.

              What does this mean?

              You're running a OpenVPN client on pfSense, right?
              So you have to assign an interface to the OpenVPN clients instance.
              Interfaces > assign
              select the OpenVPN client instance (e.g. ovpnc1) and hit Add
              Open the new interface and enable it, you may also assign a custom name and save it.

              By default pfSense generates outbound NAT rules automatically when you do that.

              1 Reply Last reply Reply Quote 0
              • N Offline
                nexodev
                last edited by

                @viragomann:

                You're running a OpenVPN client on pfSense, right?
                So you have to assign an interface to the OpenVPN clients instance.
                Interfaces > assign
                select the OpenVPN client instance (e.g. ovpnc1) and hit Add
                Open the new interface and enable it, you may also assign a custom name and save it.

                Yes, this is what I did.
                I deleted and recreated the interface as you described to be sure.
                But no outbound NAT rules are generated.

                1 Reply Last reply Reply Quote 0
                • V Offline
                  viragomann
                  last edited by

                  So add it by yourself.

                  Switch the outbound NAT rule generation mode to Hybrid.
                  Then add rules to the OpenVPN clients interface for LAN network and pfSense comparably to the existing ones for WAN.

                  One with
                  interface = <openvpn clients="" interface="">source = LAN net
                  Other options at the default values.

                  a second with
                  interface = <openvpn clients="" interface="">source = 127.0.0.0/8</openvpn></openvpn>

                  1 Reply Last reply Reply Quote 0
                  • N Offline
                    nexodev
                    last edited by

                    Okay, by LAN net you mean the local network of my pfSense machine?
                    Because LAN is also the name of the interface which is associated with the VPN, while the interface called "WAN" is associated to the local network (confusing, I know..)

                    I attached a screenshot of the current configuration

                    nat-outbound.png
                    nat-outbound.png_thumb

                    1 Reply Last reply Reply Quote 0
                    • V Offline
                      viragomann
                      last edited by

                      Yes, pfSense uses this notation. "LAN net" is the network assigned to the LAN interface in firewall rules. In the outbound NAT rules the network has to be entered manually.
                      However, the network in that rule has to be that one from which you want to access the devices behind the vpn (the internal network, obviously the WAN network in your case=

                      If you're accessing from WAN interface, ensure that you've unchecked "block private networks" in the WAN interface settings and that you have a firewall rule in place on WAN interface to permit the access.

                      1 Reply Last reply Reply Quote 0
                      • N Offline
                        nexodev
                        last edited by

                        Hmm, even with rules that allow everything, still no success..

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.