Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to see local subnet when connected on the VPN.

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 3 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      yeah very clean if your all dhcp..

      Not sure what you mean by even if running firewalls you would expect to reach them? Can tell you for sure that for example windows machines firewall would block all access to services running from a different network segment unless you had set the rules different.. 192.168.2 is not 192.168.1 so to the firewall its NON local even if its rfc1918 space.

      Can you hit the pfsense gui on 192.168.1.x? Can you ping anything on 192.168.1.x? When you do a traceroute from your vpn client you see it send traffic down the tunnel? When you want to go to 192.168.1.x?

      example
      C:>tracert -d 192.168.9.100

      Tracing route to 192.168.9.100 over a maximum of 30 hops

      1 100 ms 99 ms 110 ms 10.0.8.1
      2 105 ms 112 ms 104 ms 192.168.9.100

      Trace complete.

      C:>

      That is me trace to a box on my home lan, vpn'd in from work... The high times 100ms is because I have to bounce off a proxy to get to my home network from work - and the proxy is in TX vs Chicago... So traffic goes from Chicago area to Houston, and back ;)

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • E
        esteidinger
        last edited by

        @johnpoz I should be able to reach the webclients even if the local servers have a firewall enabled.
        For example I should be able to see the local grafana instance while on the VPN.

        When connected to the VPN from the office:

        I can not hit the pfSense GUI.

        This site can’t be reached
        https://192.168.1.1/ is unreachable.
        ERR_ADDRESS_UNREACHABLE

        I can not ping the pfSense IP

        PING 192.168.1.1 (192.168.1.1): 56 data bytes
        Request timeout for icmp_seq 0
        Request timeout for icmp_seq 1
        Request timeout for icmp_seq 2
        Request timeout for icmp_seq 3
        ping: sendto: No route to host
        Request timeout for icmp_seq 4
        ping: sendto: Host is down
        Request timeout for icmp_seq 5
        ping: sendto: Host is down
        Request timeout for icmp_seq 6
        ping: sendto: Host is down
        Request timeout for icmp_seq 7
        ping: sendto: Host is down
        Request timeout for icmp_seq 8
        ping: sendto: Host is down
        Request timeout for icmp_seq 9
        ping: sendto: Host is down
        Request timeout for icmp_seq 10

        Traceroute fails

        Traceroute has started…

        traceroute to 192.168.1.1 (192.168.1.1), 64 hops max, 72 byte packets
        1 * * *
        2 *traceroute: sendto: Host is down
        traceroute: wrote 192.168.1.1 72 chars, ret=-1
        *traceroute: sendto: Host is down
        traceroute: wrote 192.168.1.1 72 chars, ret=-1
        *
        traceroute: sendto: Host is down
        3 traceroute: wrote 192.168.1.1 72 chars, ret=-1
        *traceroute: sendto: Host is down
        traceroute: wrote 192.168.1.1 72 chars, ret=-1

        4 * * *
        5 *traceroute: sendto: No route to host
        traceroute: wrote 192.168.1.1 72 chars, ret=-1
        *traceroute: sendto: Host is down
        traceroute: wrote 192.168.1.1 72 chars, ret=-1
        *
        traceroute: sendto: Host is down
        6 traceroute: wrote 192.168.1.1 72 chars, ret=-1
        *traceroute: sendto: Host is down
        traceroute: wrote 192.168.1.1 72 chars, ret=-1

        My linux hosts are more important to me than the windows stuff, so checking my linux hosts iptables have very modest rules all set to allow.

        Perhaps there should be some simple questions answered first:
        -If I used the pfSense wizard to configure a remote access VPN should I have access to the local subnet?
        -Do I need to check a box, or enter an address to do it?
        -Should my connection have used the local DNS server or should I have had to force a DNS resolver? This seems like an extra step I didn't see most tutorials take.

        Basically am I broken or did I configure incorrectly?

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          @esteidinger said in Unable to see local subnet when connected on the VPN.:

          ping: sendto: No route to host

          You sure your even connected to your vpn? what does it show for the route to 192.168.1?

          Do a simple netstat -nr when your connected to vpn

          Yes if when you ran through the wizard you answered the questions correctly - I you put in your local network.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          E 1 Reply Last reply Reply Quote 0
          • E
            esteidinger @johnpoz
            last edited by

            @johnpoz

            I sure think so. I get an IP address of 192.168.2.2

            Looking in OpenVPN inside PFSense

            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_VER=2.4.4
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_PLAT=mac
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_PROTO=2
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_NCP=2
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_LZ4=1
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_LZ4v2=1
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_LZO=1
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_COMP_STUB=1
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_COMP_STUBv2=1
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 peer info: IV_TCPNL=1
            Oct 12 14:06:36	openvpn		user 'esteid' authenticated
            Oct 12 14:06:36	openvpn	44498	144.121.5.10:1194 [esteid] Peer Connection Initiated with [AF_INET]144.121.5.10:1194
            Oct 12 14:06:36	openvpn	44498	esteid/144.121.5.10:1194 MULTI_sva: pool returned IPv4=192.168.2.2, IPv6=(Not enabled)
            

            I can do the same with ios.

            I did put in the local IP range when I used the wizard.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              Where is your route lets see your netstat -nr from your client.

              Your connection log should also show you the route(s).

              Fri Oct 12 14:51:54 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.0.8.2/255.255.255.0 on interface {1F3723EC-C42B-4EC6-A2C0-5EAABB0BF77E} [DHCP-serv: 10.0.8.254, lease-time: 31536000]
              Fri Oct 12 14:51:54 2018 Successful ARP Flush on interface [14] {1F3723EC-C42B-4EC6-A2C0-5EAABB0BF77E}
              Fri Oct 12 14:51:54 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
              Fri Oct 12 14:51:54 2018 MANAGEMENT: >STATE:1539373914,ASSIGN_IP,,10.0.8.2,,,,
              Fri Oct 12 14:51:59 2018 TEST ROUTES: 3/3 succeeded len=3 ret=1 a=0 u/d=up
              Fri Oct 12 14:51:59 2018 MANAGEMENT: >STATE:1539373919,ADD_ROUTES,,,,,,
              Fri Oct 12 14:51:59 2018 C:\Windows\system32\route.exe ADD 192.168.9.0 MASK 255.255.255.0 10.0.8.1
              Fri Oct 12 14:51:59 2018 Route addition via service succeeded
              Fri Oct 12 14:51:59 2018 C:\Windows\system32\route.exe ADD 192.168.2.0 MASK 255.255.255.0 10.0.8.1
              Fri Oct 12 14:51:59 2018 Route addition via service succeeded
              Fri Oct 12 14:51:59 2018 C:\Windows\system32\route.exe ADD 192.168.3.0 MASK 255.255.255.0 10.0.8.1
              Fri Oct 12 14:51:59 2018 Route addition via service succeeded
              Fri Oct 12 14:51:59 2018 Initialization Sequence Completed
              

              Here is log from my iphone connecting

              2018-53-12 14:53:30 NIP: adding IPv4 address to network settings 10.0.200.2/255.255.255.0
              2018-53-12 14:53:30 NIP: adding (included) IPv4 route 10.0.200.0/24
              2018-53-12 14:53:30 NIP: adding (included) IPv4 route 192.168.9.0/24
              2018-53-12 14:53:30 NIP: adding (included) IPv4 route 192.168.2.0/24
              2018-53-12 14:53:30 NIP: adding (included) IPv4 route 192.168.3.0/24
              2018-53-12 14:53:30 NIP: adding DNS 192.168.9.253
              2018-53-12 14:53:30 NIP: blocking all IPv6 traffic
              2018-53-12 14:53:30 NIP: adding match domain ALL
              2018-53-12 14:53:30 NIP: adding DNS specific routes:
              2018-53-12 14:53:30 NIP: adding (included) IPv4 route 192.168.9.253/32
              2018-53-12 14:53:30 Connected via NetworkExtensionTUN
              

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              E 1 Reply Last reply Reply Quote 0
              • E
                esteidinger @johnpoz
                last edited by

                @johnpoz

                I am uncomfortable doing a netstat on the work computer. I'll grab a machine at home and do it there.

                Appreciate your effort. I'll try not to leave you waiting too long.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  huh?? its a listing of the routes... You don't have to show ALL of them just validate that it shows your route to 192.168.1.1 pointing to your tun.

                  You should see them added in your connection log as well as I posted above.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • E
                    esteidinger
                    last edited by

                    There are no 192.168.1.1 entries.

                    Internet:
                    Destination Gateway Flags Refs Use Netif Expire
                    0/1 192.168.2.1 UGSc 64 0 utun5
                    default 172.20.10.1 UGSc 0 0 en0
                    71.192.73.47/32 172.20.10.1 UGSc 1 0 en0
                    127 127.0.0.1 UCS 0 0 lo0
                    127.0.0.1 127.0.0.1 UH 3 67130 lo0
                    128.0/1 192.168.2.1 UGSc 3 0 utun5
                    169.254 link#5 UCS 0 0 en0
                    172.20.10/28 link#5 UCS 1 0 en0
                    172.20.10.1/32 link#5 UCS 1 0 en0
                    172.20.10.1 3a:53:9c🅰72:64 UHLWIir 4 46 en0 1151
                    172.20.10.2/32 link#5 UCS 0 0 en0
                    172.20.10.15 ff:ff:ff:ff:ff:ff UHLWbI 0 6 en0
                    192.168.2 192.168.2.2 UGSc 16 0 utun5
                    192.168.2.2 192.168.2.2 UH 2 52 utun5

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      then you didn't answer the wizards questions correctly?

                      what do you have in your local network?

                      0_1539422031566_localnetwork.png

                      If it doesn't hand you a route - then NO your not going to go down the tunnel to get there...

                      Looks like you should be going down the tunnel as default
                      0/1 192.168.2.1 UGSc 64 0 utun5
                      128.0/1 192.168.2.1 UGSc 3 0 utun5

                      But then you should see your first hop being your the tunnel address..

                      Did you not let it create the vpn rules? What does yours look like?
                      0_1539422539709_vpnrules.png

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • B
                        bfeitell
                        last edited by

                        Have you tried adding push route statements for the networks you want to reach? By default, OpenVPN only pushes a route for the local network defined in the main config. You will also need pass rules on the lan to accept traffic from the alien network you are coming from.

                        In the Advanced config section of the VPN a push route statement for a /28 network and a /24 network will look like:

                        push "route 172.20.10.0 255.255.255.242"; push "route 192.168.0.0 255.255.255.0";

                        My preferred solution is to use TUN mode only for peer to peer links, and to use TAP mode for road warrior computer configurations. TAP mode lets you extrude the local network directly to the client rather than using a transit network. In my experience it requires writing fewer rules to get traffic flowing. The main drawback is a lack of support for TAP mode on iOS and Android clients.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          @bfeitell said in Unable to see local subnet when connected on the VPN.:

                          The main drawback

                          Why would you want to send broadcast traffic down your vpn? TAP mode is almost NEVER the correct choice.. Your performance is going to suffer as well since you will now be adding all the ethernet headers to all traffic down the tunnel.

                          local network defined in the main config.

                          He only has the 1 network, and you can put multiple networks in that config - there is little reason to adding push statements. When you can just define them in the gui where it asks for local networks.

                          0_1539424163738_localnetworks.png

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 1
                          • B
                            bfeitell
                            last edited by

                            I never noticed the change to being able to specify multiple networks in 2.4.x. That's great!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.