Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC Route all but local traffic

    Scheduled Pinned Locked Moved IPsec
    14 Posts 2 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      orddie
      last edited by

      Hi Everyone!

      I have an IP sec tunnel to another PFS sense across the the internet which im using to NAT some public IP's into.  Basically I have a lab which has hosts in need of a public IP.

      { Internet} –> PFSense a --> IPSEC --> PFsense b --> Vlan interface --> Vswitch (VmWare server) ---> Host.

      This works as expected for I have a IPSEC map which matches source <dmz subnet="">to 0.0.0.0/0 send it to IPSEC tunnel.  On pfSense A server I have a nat rule for outbound and inbound.    going to whatsmyip.org on the server shows the correct public IP from the DMZ host.  spiffy.

      I now need a host on another vlan to access that host internally.  My question is how?
      I have tried to do a firewall rule at the top for the IPSEC section of the rule set which set Source <dmz subnet="">Destination <lan subnet="">. next gateway: LAN interface.  but that did not work.

      does anyone have a suggestion as to how?</lan></dmz></dmz>

      1 Reply Last reply Reply Quote 0
      • O
        orddie
        last edited by

        I feel like this is an IPSEC issue for when I tear down the tunnels im able to access the DMZ hosts via LAN

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Yeah that's going to be tricky. The destination address on your other VLAN is included in 0.0.0.0/0 so the reply traffic is getting sucked into the traffic selector.

          You could policy route the other VLAN on interface that is the Local IPsec interface (bypassing the traffic selector) but that would involve a gateway to route to that likely doesn't exist.

          You might be able to outbound NAT the traffic out of the local interface so replies are same-subnet, but that will probably only work if the IPsec Local network is actually the "lan" meaning the second interface in the system (wan is first) since that is the only interface for which IPsec is deliberately bypassed. (enumerated in Status > Interfaces).

          This is all a lot easier with OpenVPN.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • O
            orddie
            last edited by

            going that way now.

            1 Reply Last reply Reply Quote 0
            • O
              orddie
              last edited by

              followed https://doc.pfsense.org/index.php/OpenVPN_Site_To_Site but now I have no access to to the DMZ network and the DMZ network can not ping to the internet.

              bummer

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Then you did it wrong. :P

                That document doesn't cover everything necessary to policy route internet traffic out the VPN, assigned interfaces, etc.

                You at least need to:

                Assign an interface
                Make sure all the rules are where they need to be
                There was this thread a while ago. Most of what you need should be covered. You will probably need less NAT since you're dealing with routable addresses.

                https://forum.pfsense.org/index.php?topic=82732.msg453269#msg453269

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • O
                  orddie
                  last edited by

                  thanks.  That helped a bit.

                  I have outbound internet working as expected but inbound..  the nat is not working.

                  from a host on the DMZ, I go to whats my IP and the traffic goes across the open VPN tunnel and out the public ip it's 1:1 tied to.  change the 1:1 relation to another public IP sees this updated via a browser refresh.

                  can ping out as well.. no issues.

                  internal hosts on the LAN, local to the DMZ, can access the servers locally.    so im close!

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    Not sure what to have you check there.

                    Be sure the rules on the OpenVPN tab on the DMZ side of the tunnel do not match the inbound traffic. If they match the OpenVPN (interface group) tab it won't work.

                    They have to match the rules on the assigned interface to get the benefit of pf's reply-to functionality or the replies to the inbound connection will follow the routing table (likely be forwarded out WAN) instead of back through OpenVPN. This is a main piece of the puzzle that you cannot do using IPsec.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • O
                      orddie
                      last edited by

                      haha.. well not I managed to go far back and nothing works again :(

                      on both boxes, I have a PIA interface created.  this interface shows up after the openVPN tunnel comes up.

                      on PFA - this is the router in the sky terminating all my Public IP's - I have NTAs to forward 1.1.1.1:3389 to 10.253.253.1
                      on PFA - my openVPN config has Tunnel Network = 10.200.200.0/24 and IPv4 remote networks as 10.201.201.0/24
                      on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <– --> 10.201.201.0/24.  bi-directional
                      on PFA - I have my PIA rules the same as openVPN

                      on PFB - this is the router which terminates the VLN's and the 10.253.253.1 subnet..  I have a firewall rule setting my next hop for all 0.0.0.0/0 traffic to the openVPN interface
                      on PFB - my openVPN config has Tunnel Network = 10.201.201.0/24 and IPv4 remote networks as 10.200.200.0/24
                      on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <-- --> 10.201.201.0/24.  bi-directional
                      on PFA - I have my PIA rules the same as openVPN

                      1 Reply Last reply Reply Quote 0
                      • O
                        orddie
                        last edited by

                        ok.. outbound is working again.  HAHA.  sorry.  this is hard to follow im sure.  really thank you for your efforts thus far!!

                        on PFA - this is the router in the sky terminating all my Public IP's - I have NTAs to forward 1.1.1.1:3389 to 10.253.253.1
                        on PFA - my openVPN config has Tunnel Network = 10.200.200.0/24 and IPv4 remote networks as 10.201.201.0/24
                        on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <– --> 10.201.201.0/24.  bi-directional
                        on PFA - I have my PIA rules the same as openVPN + Source: 10.253.253.0/24 Dest: any

                        on PFB - this is the router which terminates the VLN's and the 10.253.253.1 subnet..  I have a firewall rule setting my next hop for all 0.0.0.0/0 traffic to the openVPN interface
                        on PFB - my openVPN config has Tunnel Network = 10.201.201.0/24 and IPv4 remote networks as 10.200.200.0/24
                        on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <-- --> 10.201.201.0/24.  bi-directional
                        on PFA - I have my PIA rules the same as openVPN

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          If 10.253.253.1 is on the other side of the tunnel then it needs to be a remote network on PFA for starters.

                          What does PIA have to do with anything? First time you have mentioned another OpenVPN client.

                          I don't have the time to draw your diagram for you right now.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • O
                            orddie
                            last edited by

                            not asking for you for drawl anything and again i thank you for your time this far!!

                            the PIA is nothing more than what i changed the openVPN adaptors to.  its a name reference only

                            1 Reply Last reply Reply Quote 0
                            • O
                              orddie
                              last edited by

                              per your suggestion

                              on PFA I changed the openVPN config as follows
                              Tunnel network: 10.200.200.0/24
                              Remote networks: 10.254.254.0/24

                              on PFB I changed the openVPN config as follows
                              Tunnel network: 10.200.200.0/24
                              Remote networks: 10.253.253.0/24

                              when openVPN comes up they have the following iP
                              PFA 10.200.200.1/24
                              PFB 10.200.200.2/24

                              on the PIA rule set (again this is the openVPN interface name ONLY) I have allow bidirectional 10.200.200.0/24

                              on PFA I have a 1:1 nat from public IP 1.1.1.1 to 10.253.253.1

                              on PFB I have a firewall rule at the top of DMZ network (10.253.253.0./24) to set next hop to be PIA interface.

                              doing a trace route from 10.253.253.1 to 8.8.8.8 shows the traffic hitting 10.200.200.1 first (PFa's openVPN interface).

                              PFA has a LAN IP of 10.254.254.254/24
                              PFB has a LAN IP of 10.253.253.254/24

                              NAT rules on PFB are set to manual

                              PFA_OpenVPN-config.png
                              PFA_OpenVPN-config.png_thumb
                              PFB_OpenVPN-config.png
                              PFB_OpenVPN-config.png_thumb
                              PFB_NextHop-FW-Rule.png
                              PFB_NextHop-FW-Rule.png_thumb
                              PFB_Nat.png
                              PFB_Nat.png_thumb

                              1 Reply Last reply Reply Quote 0
                              • O
                                orddie
                                last edited by

                                got it fixed.  missing nat rule on PFA from internet to 10.253.253.0/24 network

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.