Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC Route all but local traffic

    Scheduled Pinned Locked Moved IPsec
    14 Posts 2 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      orddie
      last edited by

      I feel like this is an IPSEC issue for when I tear down the tunnels im able to access the DMZ hosts via LAN

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Yeah that's going to be tricky. The destination address on your other VLAN is included in 0.0.0.0/0 so the reply traffic is getting sucked into the traffic selector.

        You could policy route the other VLAN on interface that is the Local IPsec interface (bypassing the traffic selector) but that would involve a gateway to route to that likely doesn't exist.

        You might be able to outbound NAT the traffic out of the local interface so replies are same-subnet, but that will probably only work if the IPsec Local network is actually the "lan" meaning the second interface in the system (wan is first) since that is the only interface for which IPsec is deliberately bypassed. (enumerated in Status > Interfaces).

        This is all a lot easier with OpenVPN.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • O
          orddie
          last edited by

          going that way now.

          1 Reply Last reply Reply Quote 0
          • O
            orddie
            last edited by

            followed https://doc.pfsense.org/index.php/OpenVPN_Site_To_Site but now I have no access to to the DMZ network and the DMZ network can not ping to the internet.

            bummer

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              Then you did it wrong. :P

              That document doesn't cover everything necessary to policy route internet traffic out the VPN, assigned interfaces, etc.

              You at least need to:

              Assign an interface
              Make sure all the rules are where they need to be
              There was this thread a while ago. Most of what you need should be covered. You will probably need less NAT since you're dealing with routable addresses.

              https://forum.pfsense.org/index.php?topic=82732.msg453269#msg453269

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • O
                orddie
                last edited by

                thanks.  That helped a bit.

                I have outbound internet working as expected but inbound..  the nat is not working.

                from a host on the DMZ, I go to whats my IP and the traffic goes across the open VPN tunnel and out the public ip it's 1:1 tied to.  change the 1:1 relation to another public IP sees this updated via a browser refresh.

                can ping out as well.. no issues.

                internal hosts on the LAN, local to the DMZ, can access the servers locally.    so im close!

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Not sure what to have you check there.

                  Be sure the rules on the OpenVPN tab on the DMZ side of the tunnel do not match the inbound traffic. If they match the OpenVPN (interface group) tab it won't work.

                  They have to match the rules on the assigned interface to get the benefit of pf's reply-to functionality or the replies to the inbound connection will follow the routing table (likely be forwarded out WAN) instead of back through OpenVPN. This is a main piece of the puzzle that you cannot do using IPsec.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • O
                    orddie
                    last edited by

                    haha.. well not I managed to go far back and nothing works again :(

                    on both boxes, I have a PIA interface created.  this interface shows up after the openVPN tunnel comes up.

                    on PFA - this is the router in the sky terminating all my Public IP's - I have NTAs to forward 1.1.1.1:3389 to 10.253.253.1
                    on PFA - my openVPN config has Tunnel Network = 10.200.200.0/24 and IPv4 remote networks as 10.201.201.0/24
                    on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <– --> 10.201.201.0/24.  bi-directional
                    on PFA - I have my PIA rules the same as openVPN

                    on PFB - this is the router which terminates the VLN's and the 10.253.253.1 subnet..  I have a firewall rule setting my next hop for all 0.0.0.0/0 traffic to the openVPN interface
                    on PFB - my openVPN config has Tunnel Network = 10.201.201.0/24 and IPv4 remote networks as 10.200.200.0/24
                    on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <-- --> 10.201.201.0/24.  bi-directional
                    on PFA - I have my PIA rules the same as openVPN

                    1 Reply Last reply Reply Quote 0
                    • O
                      orddie
                      last edited by

                      ok.. outbound is working again.  HAHA.  sorry.  this is hard to follow im sure.  really thank you for your efforts thus far!!

                      on PFA - this is the router in the sky terminating all my Public IP's - I have NTAs to forward 1.1.1.1:3389 to 10.253.253.1
                      on PFA - my openVPN config has Tunnel Network = 10.200.200.0/24 and IPv4 remote networks as 10.201.201.0/24
                      on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <– --> 10.201.201.0/24.  bi-directional
                      on PFA - I have my PIA rules the same as openVPN + Source: 10.253.253.0/24 Dest: any

                      on PFB - this is the router which terminates the VLN's and the 10.253.253.1 subnet..  I have a firewall rule setting my next hop for all 0.0.0.0/0 traffic to the openVPN interface
                      on PFB - my openVPN config has Tunnel Network = 10.201.201.0/24 and IPv4 remote networks as 10.200.200.0/24
                      on PFA - I have my openVPN firewall rule to allow 10.200.200.0/24. <-- --> 10.201.201.0/24.  bi-directional
                      on PFA - I have my PIA rules the same as openVPN

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        If 10.253.253.1 is on the other side of the tunnel then it needs to be a remote network on PFA for starters.

                        What does PIA have to do with anything? First time you have mentioned another OpenVPN client.

                        I don't have the time to draw your diagram for you right now.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • O
                          orddie
                          last edited by

                          not asking for you for drawl anything and again i thank you for your time this far!!

                          the PIA is nothing more than what i changed the openVPN adaptors to.  its a name reference only

                          1 Reply Last reply Reply Quote 0
                          • O
                            orddie
                            last edited by

                            per your suggestion

                            on PFA I changed the openVPN config as follows
                            Tunnel network: 10.200.200.0/24
                            Remote networks: 10.254.254.0/24

                            on PFB I changed the openVPN config as follows
                            Tunnel network: 10.200.200.0/24
                            Remote networks: 10.253.253.0/24

                            when openVPN comes up they have the following iP
                            PFA 10.200.200.1/24
                            PFB 10.200.200.2/24

                            on the PIA rule set (again this is the openVPN interface name ONLY) I have allow bidirectional 10.200.200.0/24

                            on PFA I have a 1:1 nat from public IP 1.1.1.1 to 10.253.253.1

                            on PFB I have a firewall rule at the top of DMZ network (10.253.253.0./24) to set next hop to be PIA interface.

                            doing a trace route from 10.253.253.1 to 8.8.8.8 shows the traffic hitting 10.200.200.1 first (PFa's openVPN interface).

                            PFA has a LAN IP of 10.254.254.254/24
                            PFB has a LAN IP of 10.253.253.254/24

                            NAT rules on PFB are set to manual

                            PFA_OpenVPN-config.png
                            PFA_OpenVPN-config.png_thumb
                            PFB_OpenVPN-config.png
                            PFB_OpenVPN-config.png_thumb
                            PFB_NextHop-FW-Rule.png
                            PFB_NextHop-FW-Rule.png_thumb
                            PFB_Nat.png
                            PFB_Nat.png_thumb

                            1 Reply Last reply Reply Quote 0
                            • O
                              orddie
                              last edited by

                              got it fixed.  missing nat rule on PFA from internet to 10.253.253.0/24 network

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.