OpenVPN TAP works, but cant access any services on the router
-
hi simon.
i am currently on the latest 2.4.2-RELEASE version on all of my routers, and openvpn tap and tun servers are working as they should.
as i see in your thread, it seems that you have a problem bridging the LAN an TAP interfaces? that can be done under interfaces -> assignments -> bridges. you need to configure the LAN TAP bridge there. -
Thanks for your reply. I've been struggling for many days now and there is no documentation available. I had done that already my interface from the openvpn tap server has been enabled and named "TAP" and is bridged with the LAN interface and the resulting bridge is called BR0. I have assigned BR0 as my Bridge Interface in the openvpn server configuration page. I have also specified Server Bridge DHCP Start and End IPs in the server configuration page and it is these IPs that do not appear in the generated server.conf file. This is where I have my doubts.
Still it's good to know that you have it working properly.
Did you need to set any additional Custom options?
Please could you share your firewall rules needed?
I've been trying to Force all client-generated IPv4 traffic through the tunnel. Have you been able to do this? -
i know there is a lack of documentation on getting tap running in pfsense.
the first time i made a tap server, i actually fallowed documentation on making a tun server, and then tweaking it to make it work as a tap server.
i can make some screenshots tomorrow so you can compare settings with yours.
i did not make any changes to the conf file, i just used the web gui to make all the necessary settings.for tunneling trough the routers - ie using it as a vpn tunnel so i can exit to the internet trough that router, i have a separate tun server running in parallel with tap server.
every router has 2 openvpn servers, one tap for accessing local network while going to the internet not using a tunnel, and other one is tun for using a pfsense router as an exit node to the internet.also, tap is not working on android, so that is a reason for making another tun server.
-
What is the point of the tap? It doesn't work on ios either… I just do not get why anyone would need to run a tap? What are you doing that requires layer 2?
-
Thanks for your reply. I've been struggling for many days now and there is no documentation available. I had done that already my interface from the openvpn tap server has been enabled and named "TAP" and is bridged with the LAN interface and the resulting bridge is called BR0. I have assigned BR0 as my Bridge Interface in the openvpn server configuration page. I have also specified Server Bridge DHCP Start and End IPs in the server configuration page and it is these IPs that do not appear in the generated server.conf file. This is where I have my doubts.
Still it's good to know that you have it working properly.
Did you need to set any additional Custom options?
Please could you share your firewall rules needed?
I've been trying to Force all client-generated IPv4 traffic through the tunnel. Have you been able to do this?hi simon.
here are some screenshots in the attachment of my tap configuration. hope it helps.
unfortunately i do not have a complete tutorial, i learned by trial and error, and after 3 days on a test system i learned how to make it work and then made all the necessary configurations on the main routers.
currently i use the dhcp of the vpn server (.240 - .249), but i plan to configure the server so every client gets the same ip every time.also, this was a great help then, and if you need a tutorial on making users, certificates and everything else, you can watch this.
https://www.youtube.com/watch?v=xiy52Hn5bTc
i know that the turtorial is for tun mode, but many things are the same.another useful info for new users - on the home router, where i do not have static ip, i use freemyip.com dynamic DNS.
![Screenshot 2018-01-09 11.59.11.png](/public/imported_attachments/1/Screenshot 2018-01-09 11.59.11.png)
![Screenshot 2018-01-09 11.59.11.png_thumb](/public/imported_attachments/1/Screenshot 2018-01-09 11.59.11.png_thumb)
![Screenshot 2018-01-09 11.59.39.png](/public/imported_attachments/1/Screenshot 2018-01-09 11.59.39.png)
![Screenshot 2018-01-09 11.59.39.png_thumb](/public/imported_attachments/1/Screenshot 2018-01-09 11.59.39.png_thumb)
![Screenshot 2018-01-09 11.59.54.png](/public/imported_attachments/1/Screenshot 2018-01-09 11.59.54.png)
![Screenshot 2018-01-09 11.59.54.png_thumb](/public/imported_attachments/1/Screenshot 2018-01-09 11.59.54.png_thumb)
![Screenshot 2018-01-09 12.00.01.png](/public/imported_attachments/1/Screenshot 2018-01-09 12.00.01.png)
![Screenshot 2018-01-09 12.00.01.png_thumb](/public/imported_attachments/1/Screenshot 2018-01-09 12.00.01.png_thumb)
![Screenshot 2018-01-09 12.00.24.png](/public/imported_attachments/1/Screenshot 2018-01-09 12.00.24.png)
![Screenshot 2018-01-09 12.00.24.png_thumb](/public/imported_attachments/1/Screenshot 2018-01-09 12.00.24.png_thumb)
![Screenshot 2018-01-09 12.00.57.png](/public/imported_attachments/1/Screenshot 2018-01-09 12.00.57.png)
![Screenshot 2018-01-09 12.00.57.png_thumb](/public/imported_attachments/1/Screenshot 2018-01-09 12.00.57.png_thumb) -
What is the point of the tap? It doesn't work on ios either… I just do not get why anyone would need to run a tap? What are you doing that requires layer 2?
dear johnpoz, actually one part of me was waiting for exactly this reply from you :).
in my case, i want all my clients to be on the same subnet (the vpn server just drops them on the same network), i wanted a 'real' (virtual) network adapter on my clients, and wanted broadcasts to work properly.
-
But Why?? You do understand that is not the most efficient connection. it is pointless to broadcast traffic over a vpn unless there is specific actual requirement for such a connection and also it adds overhead to every packet.. What is your specific need for this layer 2 traffic? What is it that is not working that you believe layer 2 is worth the overheard - that is my question..
https://community.openvpn.net/openvpn/wiki/BridgingAndRouting
TAP drawbacks
causes much more broadcast overhead on the VPN tunnel
adds the overhead of Ethernet headers on all packets transported over the VPN tunnel
scales poorly
can not be used with Android or iOS devicesLet me guess your answer is because that is what you want - without any technical reason? Lets lower the efficiency of the connection because I want to send noise across it so some machine shows up in windows network neighborhood? Where is the technical need for the tap vs the tun is my ? That damn curiosity cat of mine is a PITA sometimes ;)
-
But Why?? You do understand that is not the most efficient connection. it is pointless to broadcast traffic over a vpn unless there is specific actual requirement for such a connection and also it adds overhead to every packet.. What is your specific need for this layer 2 traffic? What is it that is not working that you believe layer 2 is worth the overheard - that is my question..
https://community.openvpn.net/openvpn/wiki/BridgingAndRouting
TAP drawbacks
causes much more broadcast overhead on the VPN tunnel
adds the overhead of Ethernet headers on all packets transported over the VPN tunnel
scales poorly
can not be used with Android or iOS devicesLet me guess your answer is because that is what you want - without any technical reason? Lets lower the efficiency of the connection because I want to send noise across it so some machine shows up in windows network neighborhood? Where is the technical need for the tap vs the tun is my ? That damn curiosity cat of mine is a PITA sometimes ;)
i know it is not as efficient as a tun connection, but i am not the only one using it.
a few colleagues running linux machines, and other network connected laboratory test equipment (oscilloscopes, temperature controllers, measurement computers, etc), wanted a tap connection, so i made a tap server for them, and then after a while started using it on my own routers as my primary vpn connection to a remote network.
they wanted to have the same privileges on the network as any other locally connected user (this sentence would make a lot more sense if you saw in how much chaos our work network was till recently).also, everything is connected over 100M or 1G fiber connection, so a little loss of efficiency is not a big deal here.
-
Thank you seewolf.
Our configurations are very incredibly similar. However, I've been assigning the created bridge interface for the "Bridge Interface" whereas you've assigned the LAN interface directly. Also I've been trying to Force all client-generated IPv4 traffic through the tunnel I'll do some testing and let you know. Thanks also for the YouTube video link. I also found that video useful when setting the tun server. In fact I was the last person to comment on that video 2 weeks ago suggestions a tap tutorial :-) Does the pfsense unbound DNS Resolver resolve hostnames on you LAN?
-
Thank you seewolf.
Our configurations are very incredibly similar. However, I've been assigning the created bridge interface for the "Bridge Interface" whereas you've assigned the LAN interface directly. Also I've been trying to Force all client-generated IPv4 traffic through the tunnel I'll do some testing and let you know. Thanks also for the YouTube video link. I also found that video useful when setting the tun server. In fact I was the last person to comment on that video 2 weeks ago suggestions a tap tutorial :-) Does the pfsense unbound DNS Resolver resolve hostnames on you LAN?
no problem simon.
i use a tun server for redirecting / forcing all traffic from clients trough the router, that is (as johnpoz pointed out) more efficient. i use tap server when i connect to the internet trough a clients local connection, and then just want to access other computers, servers etc, on a remote network as if i have two (or more) network connections / adapters on the working client. that is why i have all my networks on a different subnet, so i can connect to more of them at the same time while going on the internet locally (ie 10.0.0.0/24, 10.10.0.0/24, 10.20.0.0/24, etc).
the video is a great help for making a tun server.. after you get it working, you can tweak things and see how it is behaving. it takes some time, but you can learn a lot.
i dont use unbound dns resolver for resolving hostnames on my LAN, mostly because all devices have a static IP and i know all there IP addresses (i use an reversible mind logic to assign IP addresses).
and most of the things that need to connect locally or remotely, have in there configurations the static IP addresses of other devices. i like to make a local network working even if the router is it connected to is down (ie no dhcp, dns, etc). -
I have kind of same problem with OpenVPN TAP connection. When connected I can access all the local network but not pfsense machine. Which is very wierd. I am on last version of pfSense (2.4.2-RELEASE-p1) and last version of OpenVPN on client side (v2.4.4-I601).
Did you find solution?
-
I have kind of same problem with OpenVPN TAP connection. When connected I can access all the local network but not pfsense machine. Which is very wierd. I am on last version of pfSense (2.4.2-RELEASE-p1) and last version of OpenVPN on client side (v2.4.4-I601).
Did you find solution?
hi firbc.
are you running pfblockerng on your sistem? in my case there was some weird conflict with pfblockerng and openvpn. and after an update of the pfblockerng and pfsense everything started working as expected, and i never found the cause of the problem, and with that the real solution.
-
I have kind of same problem with OpenVPN TAP connection. When connected I can access all the local network but not pfsense machine. Which is very wierd. I am on last version of pfSense (2.4.2-RELEASE-p1) and last version of OpenVPN on client side (v2.4.4-I601).
Did you find solution?
hi firbc.
are you running pfblockerng on your sistem? in my case there was some weird conflict with pfblockerng and openvpn. and after an update of the pfblockerng and pfsense everything started working as expected, and i never found the cause of the problem, and with that the real solution.
no, the only package I have installed is OpenVPN client export tool…
-
seewolf, does pinging pfsense machine in your case work? I cannot even ping it. On tun it is working normally.
-
seewolf, does pinging pfsense machine in your case work? I cannot even ping it. On tun it is working normally.
at the moment everything works nominally.
when i had the problem, as i said in the first post, i could ping the router and that was the only thing i could do towards the router.did you try to reinstall the machine?
unfortunately that is the only thing i can suggest at this moment.and are you sure that the openvpn server configuration is correct?
-
Sorry to ressurect this thread, but I’m seing the same problem on my 2.4.5 pfsense. Access to the router itself is “spotty”. Sometimes it works all day and in all sessions, other times everything but access to the router works.
I have no packages installed.I was just wondering if you keept experiencing the problem on and off like me even though you felt pfblockerng was involved initially?
@johnpoz I understand your argument for TUN, but if you have very complex routed networks behind the router with accesslists all over the place, TAP can start to make sense :-)
-
@keyser
unfortunately (for this case) i have not experienced this problem any more during the last couple of years. any time i connect to a tap server, it just puts me on the lan network. -
I have tried everything, and it’s definitly a “glitch” in the OpenVPN/pfSense TAP combination. It mostly never works, but once in a while I can all of a sudden access the GUI and the local resolver.
Well, decided to change my setup to a routed TUN solution instead with outbound NAT applied on access to LAN.
Not a great solution, but I have a workaround for the two issues NAT presents in our application usage. -
I am facing issue with TAP config, there is a server location in inside the pfsense network, using tap we are accessing that server from outside the network from different locations and different system, the issue is, some users able to access the server few of them are not, the users who are unable to access server are able to access other VPN clients.